Shadow Posted Saturday at 11:11 PM Report Posted Saturday at 11:11 PM Hi, does anyone have MZPack 3.18.28 or above? (Not 3.18.8 as this is a much older version) It includes individual profile splitting, and so much more orderflow additions etc. Super super good TPO so is much superior to others shared here. If anyone could Edu or share it would be extremely appreciated! Thanks for all the help. @apmoo @kimsam
hammyy2k Posted yesterday at 03:21 PM Report Posted yesterday at 03:21 PM Here is 3.18.31 EDU included MZpack.NT8 3.18.31.rar ⭐ ajeet, Ac423, kkreig and 9 others 10 2
Shadow Posted yesterday at 03:41 PM Author Report Posted yesterday at 03:41 PM 18 minutes ago, hammyy2k said: Here is 3.18.31 EDU included MZpack.NT8 3.18.31.rar 14.92 MB · 6 downloads @hammyy2k You are amazing brother! Thank you 🙂
hakuthedog Posted 19 hours ago Report Posted 19 hours ago Attention, everyone! Virus Total recognizes it as a Trojan, but the situation is much more complicated than that: this file is a virus, I performed an analysis using a memory dump and by analyzing netstat. Type: RAT, VMProtect 3.x packer. Injected shellcode, in‑process execution. SetWindowsHookEx → keylogger. There are 4 ESTABLISHED connections active from the malware process. It uses ANTI evasion techniques. VMProtect 3.x packing → code obfuscation Process injection → runs inside a legitimate process WebSocket encryption → TLS 1.3 to hide traffic Cloud infrastructure → appears legitimate Custom binary protocol → not recognized by IDS Registry hooking → persistence after reboot LoneBladeRGC 1
TRADER Posted 18 hours ago Report Posted 18 hours ago https://workupload.com/file/tyLznxxAF4R LoneBladeRGC 1
TRADER Posted 18 hours ago Report Posted 18 hours ago 56 minutes ago, hakuthedog said: Attention, everyone! Virus Total recognizes it as a Trojan, but the situation is much more complicated than that: this file is a virus, I performed an analysis using a memory dump and by analyzing netstat. Type: RAT, VMProtect 3.x packer. Injected shellcode, in‑process execution. SetWindowsHookEx → keylogger. There are 4 ESTABLISHED connections active from the malware process. It uses ANTI evasion techniques. VMProtect 3.x packing → code obfuscation Process injection → runs inside a legitimate process WebSocket encryption → TLS 1.3 to hide traffic Cloud infrastructure → appears legitimate Custom binary protocol → not recognized by IDS Registry hooking → persistence after reboot bro chech this link this file is clean LoneBladeRGC 1
Shadow Posted 11 hours ago Author Report Posted 11 hours ago 6 hours ago, TRADER said: bro chech this link this file is clean So I've installed a virus lol 🤦🏼♂️ Is the one you sent clean and educated?
⭐ laser1000it Posted 9 hours ago Report Posted 9 hours ago 1 hour ago, Shadow said: So I've installed a virus lol 🤦🏼♂️ Is the one you sent clean and educated? What you installed is completely worthless, I mean MZ. If you’re worried about your PC, don’t be: it’s just a false positive.
Shadow Posted 6 hours ago Author Report Posted 6 hours ago 3 hours ago, laser1000it said: What you installed is completely worthless, I mean MZ. If you’re worried about your PC, don’t be: it’s just a false positive. Ah so I've not got a virus then? Also, in regards to MZ. It works perfectly fine. I just needed it's TPO and it does the job well
⭐ rcarlos1947 Posted 1 hour ago Report Posted 1 hour ago After installing on 2 PC's, I get strange behavior on sim data feed. It keeps connecting and disconnecting continuously, but on Live data feed it stays connected without issue. Both PC's are NT8 edu. Anybody seeing the same behavior ? Btw, at one point I got tag that showed it might be a Val1312q product.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now