URL:

https://filmora.wondershare.com/video-editor/?AF=60&AT=148&VMFCT=11&VM2MCT=39&M2VMCT=33&GDT=164&GET=30&ART=31&ABT=48&ABDT=83&ATT=115

Full analysis: https://app.any.run/tasks/70feb8ab-d680-41ba-8381-980ba4b6ef90
Verdict: Malicious activity
Analysis date: November 24, 2020, 18:22:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

0958606F1FD1FC44A622E219905CEC19

SHA1:

74F0E7B6F6ED21C5928C7BDD3FECDFF80510E231

SHA256:

5FADA967A98DFB9D2492B8CCB60360E387BA1B2BA0E256457B4AF6AC6F86961A

SSDEEP:

3:N8kxQCQLGKjlKIABM2Kc9kHvojsN7SDoj1SDinYYbfDkxsxxYC:2kKCQLGE2KtP+ISDoMDyYYjgsxeC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • filmora_setup_full846.exe (PID: 3524)
      • filmora_setup_full846.exe (PID: 3708)
      • NFWCHK.exe (PID: 2916)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 564)
      • filmora_setup_full846.exe (PID: 3708)
    • Drops a file that was compiled in debug mode

      • chrome.exe (PID: 564)
      • filmora_setup_full846.exe (PID: 3708)
    • Drops a file with a compile date too recent

      • chrome.exe (PID: 564)
    • Low-level read access rights to disk partition

      • filmora_setup_full846.exe (PID: 3708)
    • Reads internet explorer settings

      • filmora_setup_full846.exe (PID: 3708)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 564)
      • chrome.exe (PID: 2224)
    • Application launched itself

      • chrome.exe (PID: 564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
17
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs filmora_setup_full846.exe no specs filmora_setup_full846.exe nfwchk.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
564"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://filmora.wondershare.com/video-editor/?AF=60&AT=148&VMFCT=11&VM2MCT=39&M2VMCT=33&GDT=164&GET=30&ART=31&ABT=48&ABDT=83&ATT=115"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
692"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9193404250818403230 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2428 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1160"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8145596740855117808 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1216"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8334588122557223323 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1736"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=2085323830945513283 --mojo-platform-channel-handle=4152 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1912"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8422192061822281943 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1924"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=561220879792853738 --mojo-platform-channel-handle=1024 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2224"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1020,16165065344012536921,5715267367782638066,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=17819914581213644105 --mojo-platform-channel-handle=1500 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2560"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2268 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2916C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exefilmora_setup_full846.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\public\documents\wondershare\nfwchk.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
1 061
Read events
983
Write events
75
Delete events
3

Modification events

(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2560) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:564-13250715760297500
Value:
259
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(564) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
Executable files
4
Suspicious files
144
Text files
91
Unknown types
0

Dropped files

PID
Process
Filename
Type
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FBD4F70-234.pma
MD5:
SHA256:
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\b61cd85c-ee14-46a9-8aea-936cf4b20b4f.tmp
MD5:
SHA256:
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7
SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:FB5B20517A0D1F7DAD485989565BEE5E
SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF154177.TMPtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:C5C3F347BDC11EA7A5BF62BCEA89896F
SHA256:EAE604A1C662FF82AD4B2D1056179FD77587159FDD7F1674404C0465E0610BC1
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:C2DDBA63E4A2BD2E39A8B6C2C6384AAE
SHA256:6D5C1C78341C6F84911055D970ADDB0EC3499F8BF7FADE062122A22209CE67D9
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
564chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF15435c.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
136
DNS requests
72
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3708
filmora_setup_full846.exe
GET
200
47.91.67.36:80
http://platform.wondershare.com/rest/v2/downloader/runtime/?client_sign={C4BA3647-0000-0QM0-0001-12A9866C77DE}&product_id=846
US
xml
1.70 Kb
suspicious
3708
filmora_setup_full846.exe
HEAD
200
47.246.43.224:80
http://download.wondershare.com/cbs_down/filmora_full846.exe
US
whitelisted
3708
filmora_setup_full846.exe
HEAD
200
47.246.43.223:80
http://download.wondershare.com/cbs_down/filmora_full846.exe
US
whitelisted
3708
filmora_setup_full846.exe
HEAD
200
47.246.43.225:80
http://download.wondershare.com/cbs_down/filmora_full846.exe
US
whitelisted
3708
filmora_setup_full846.exe
GET
200
47.91.67.36:80
http://dlinst.wondershare.com/player/846-20201113164925.html
US
html
890 b
suspicious
3708
filmora_setup_full846.exe
HEAD
200
47.246.43.228:80
http://download.wondershare.com/cbs_down/filmora_full846.exe
US
whitelisted
3708
filmora_setup_full846.exe
GET
200
47.91.67.36:80
http://dlinst.wondershare.com/player/style/orbit-1.3.0.css
US
text
855 b
suspicious
3708
filmora_setup_full846.exe
HEAD
200
47.246.43.226:80
http://download.wondershare.com/cbs_down/filmora_full846.exe
US
whitelisted
3708
filmora_setup_full846.exe
GET
200
47.91.67.36:80
http://dlinst.wondershare.com/player/846-20201113164925.html
US
html
890 b
suspicious
3708
filmora_setup_full846.exe
GET
200
47.91.67.36:80
http://dlinst.wondershare.com/player/style/fit-style1.0.1.css
US
text
356 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2224
chrome.exe
216.58.205.237:443
accounts.google.com
Google Inc.
US
whitelisted
2224
chrome.exe
104.109.78.157:443
filmora.wondershare.com
Akamai International B.V.
NL
unknown
2224
chrome.exe
23.43.215.31:443
images.wondershare.com
Akamai International B.V.
US
unknown
2224
chrome.exe
101.227.24.226:443
allstatics.wondershare.cn
China Telecom (Group)
CN
unknown
2224
chrome.exe
184.25.218.222:443
neveragain.allstatics.com
Akamai International B.V.
NL
unknown
2224
chrome.exe
216.58.206.10:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2224
chrome.exe
2.21.36.164:443
s7.addthis.com
GTT Communications Inc.
FR
suspicious
2224
chrome.exe
216.58.212.168:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2224
chrome.exe
47.254.53.85:443
effects.wondershare.com
Alibaba (China) Technology Co., Ltd.
US
unknown
2224
chrome.exe
8.211.41.254:443
crm-static.wondershare.cc
Level 3 Communications, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
filmora.wondershare.com
  • 104.109.78.157
suspicious
accounts.google.com
  • 216.58.205.237
shared
images.wondershare.com
  • 23.43.215.31
whitelisted
allstatics.wondershare.cn
  • 101.227.24.226
  • 101.227.24.229
  • 101.227.24.225
  • 101.227.24.228
  • 101.227.24.230
  • 101.227.24.231
  • 101.227.24.224
  • 101.227.24.227
malicious
neveragain.allstatics.com
  • 184.25.218.222
whitelisted
safebrowsing.googleapis.com
  • 216.58.206.10
whitelisted
s7.addthis.com
  • 2.21.36.164
whitelisted
crm-static.wondershare.cc
  • 8.211.41.254
malicious
www.googletagmanager.com
  • 216.58.212.168
whitelisted
effects.wondershare.com
  • 47.254.53.85
unknown

Threats

PID
Process
Class
Message
1064
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1064
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
3708
filmora_setup_full846.exe
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
No debug info