analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

setup.exe

Full analysis: https://app.any.run/tasks/17f50d28-6766-4805-97a0-ae42b644c562
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: October 04, 2022, 23:42:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

E760739CCE7B7076793906A90F0EC9FF

SHA1:

E7ECE48A7B24315F372A6F75676001B1FFAE31A4

SHA256:

2F2DC7EA3BFE40F226357E703448BF25ECB19A206A5ECC3E1767BC7F93947C6B

SSDEEP:

3072:g6w9+FrD19ZQb5r25ix4dPrY7zE551QGWiE55k:rubA2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Deletes shadow copies

      • setup.exe (PID: 2268)
    • Drops executable file immediately after starts

      • setup.exe (PID: 2268)
    • Application was dropped or rewritten from another process

      • UoEanuck.exe (PID: 204)
      • UoEanuck.exe (PID: 2464)
      • UoEanuck.exe (PID: 1636)
      • UoEanuck.exe (PID: 2532)
      • UoEanuck.exe (PID: 2416)
      • UoEanuck.exe (PID: 2072)
      • UoEanuck.exe (PID: 3344)
      • UoEanuck.exe (PID: 3224)
      • UoEanuck.exe (PID: 3444)
      • UoEanuck.exe (PID: 2344)
      • UoEanuck.exe (PID: 2928)
      • UoEanuck.exe (PID: 2812)
  • SUSPICIOUS

    • Checks supported languages

      • setup.exe (PID: 2268)
      • UoEanuck.exe (PID: 204)
      • UoEanuck.exe (PID: 1636)
      • UoEanuck.exe (PID: 2532)
      • UoEanuck.exe (PID: 2464)
      • UoEanuck.exe (PID: 3344)
      • UoEanuck.exe (PID: 2072)
      • UoEanuck.exe (PID: 2416)
      • UoEanuck.exe (PID: 2344)
      • UoEanuck.exe (PID: 3444)
      • UoEanuck.exe (PID: 3224)
      • UoEanuck.exe (PID: 2812)
      • UoEanuck.exe (PID: 2928)
      • G2cvUFKU.exe (PID: 2788)
    • Reads the computer name

      • setup.exe (PID: 2268)
      • UoEanuck.exe (PID: 204)
      • UoEanuck.exe (PID: 2464)
      • UoEanuck.exe (PID: 1636)
      • UoEanuck.exe (PID: 2532)
      • UoEanuck.exe (PID: 2072)
      • UoEanuck.exe (PID: 3344)
      • UoEanuck.exe (PID: 2416)
      • UoEanuck.exe (PID: 3224)
      • UoEanuck.exe (PID: 2344)
      • UoEanuck.exe (PID: 3444)
      • UoEanuck.exe (PID: 2812)
      • G2cvUFKU.exe (PID: 2788)
      • UoEanuck.exe (PID: 2928)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 2268)
    • Drops a file with a compile date too recent

      • setup.exe (PID: 2268)
    • Executed as Windows Service

      • vssvc.exe (PID: 2772)
    • Reads Environment values

      • setup.exe (PID: 2268)
    • Changes default file association

      • setup.exe (PID: 2268)
    • Creates files like Ransomware instruction

      • UoEanuck.exe (PID: 3344)
    • Starts Internet Explorer

      • setup.exe (PID: 2268)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
  • INFO

    • Checks supported languages

      • vssadmin.exe (PID: 688)
      • vssvc.exe (PID: 2772)
      • WINWORD.EXE (PID: 3888)
      • iexplore.exe (PID: 3756)
      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
    • Manual execution by user

      • WINWORD.EXE (PID: 3888)
      • G2cvUFKU.exe (PID: 2404)
      • G2cvUFKU.exe (PID: 2788)
    • Reads the computer name

      • vssvc.exe (PID: 2772)
      • vssadmin.exe (PID: 688)
      • WINWORD.EXE (PID: 3888)
      • iexplore.exe (PID: 3756)
      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3888)
      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 3756)
      • iexplore.exe (PID: 2880)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3888)
    • Changes internet zones settings

      • iexplore.exe (PID: 3756)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 3756)
    • Application launched itself

      • iexplore.exe (PID: 3756)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3756)
      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 3756)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3756)
      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-Jun-16 01:17:05
Comments: Ransomeware Simulator
CompanyName: ShinoSec Inc.
FileDescription: ShinoLocker
FileVersion: 1.0.0.1
InternalName: ShinoLockerMain.exe
LegalCopyright: ShinoSec Inc.
LegalTrademarks: ShinoLocker
OriginalFilename: ShinoLockerMain.exe
ProductName: ShinoLocker
ProductVersion: 1.0.0.1
Assembly Version: 1.0.0.1

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 3
TimeDateStamp: 2022-Jun-16 01:17:05
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
8192
138084
138240
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.13525
.rsrc
147456
55384
55808
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.21256
.reloc
204800
12
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.16337
1128
UNKNOWN
UNKNOWN
RT_ICON
2
2.39632
4264
UNKNOWN
UNKNOWN
RT_ICON
3
2.11863
9640
UNKNOWN
UNKNOWN
RT_ICON
4
3.161
38056
UNKNOWN
UNKNOWN
RT_ICON
32512
2.40165
62
UNKNOWN
UNKNOWN
RT_GROUP_ICON
1 (#2)
3.32241
904
UNKNOWN
UNKNOWN
RT_VERSION
1 (#3)
4.92662
873
UNKNOWN
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
82
Monitored processes
22
Malicious processes
1
Suspicious processes
7

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start start setup.exe no specs setup.exe vssadmin.exe no specs vssvc.exe no specs winword.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs uoeanuck.exe no specs g2cvufku.exe no specs g2cvufku.exe uoeanuck.exe no specs uoeanuck.exe no specs iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3428"C:\Users\admin\AppData\Roaming\setup.exe" C:\Users\admin\AppData\Roaming\setup.exeExplorer.EXE
User:
admin
Company:
ShinoSec Inc.
Integrity Level:
MEDIUM
Description:
ShinoLocker
Exit code:
3221226540
Version:
1.0.0.1
2268"C:\Users\admin\AppData\Roaming\setup.exe" C:\Users\admin\AppData\Roaming\setup.exe
Explorer.EXE
User:
admin
Company:
ShinoSec Inc.
Integrity Level:
HIGH
Description:
ShinoLocker
Version:
1.0.0.1
688"C:\Windows\System32\vssadmin.exe" delete shadows /all /quietC:\Windows\System32\vssadmin.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2772C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3888"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\personway.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
204"C:\Users\admin\AppData\Local\Temp\UoEanuck.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\AppData\Local\Temp\xsouH1.txt"C:\Users\admin\AppData\Local\Temp\UoEanuck.exesetup.exe
User:
admin
Company:
Sh1n0g1
Integrity Level:
HIGH
Description:
ShinoLockerStub
Exit code:
0
Version:
1.0.0.0
2464"C:\Users\admin\AppData\Local\Temp\UoEanuck.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\modedog.jpg"C:\Users\admin\AppData\Local\Temp\UoEanuck.exesetup.exe
User:
admin
Company:
Sh1n0g1
Integrity Level:
HIGH
Description:
ShinoLockerStub
Exit code:
0
Version:
1.0.0.0
2532"C:\Users\admin\AppData\Local\Temp\UoEanuck.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\sortgermany.jpg"C:\Users\admin\AppData\Local\Temp\UoEanuck.exesetup.exe
User:
admin
Company:
Sh1n0g1
Integrity Level:
HIGH
Description:
ShinoLockerStub
Exit code:
0
Version:
1.0.0.0
1636"C:\Users\admin\AppData\Local\Temp\UoEanuck.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\staffebay.jpg"C:\Users\admin\AppData\Local\Temp\UoEanuck.exesetup.exe
User:
admin
Company:
Sh1n0g1
Integrity Level:
HIGH
Description:
ShinoLockerStub
Exit code:
0
Version:
1.0.0.0
3344"C:\Users\admin\AppData\Local\Temp\UoEanuck.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\helpfulgeorge.rtf"C:\Users\admin\AppData\Local\Temp\UoEanuck.exesetup.exe
User:
admin
Company:
Sh1n0g1
Integrity Level:
HIGH
Description:
ShinoLockerStub
Exit code:
0
Version:
1.0.0.0
Total events
40 612
Read events
39 996
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
48
Text files
103
Unknown types
31

Dropped files

PID
Process
Filename
Type
3888WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRF274.tmp.cvr
MD5:
SHA256:
2268setup.exeC:\Users\admin\AppData\Local\Temp\G2cvUFKU.exeexecutable
MD5:E760739CCE7B7076793906A90F0EC9FF
SHA256:2F2DC7EA3BFE40F226357E703448BF25ECB19A206A5ECC3E1767BC7F93947C6B
2268setup.exeC:\Users\admin\AppData\Local\Temp\xsouH1.txttext
MD5:5633BEC110C8AE987C576C7B23C7FF8F
SHA256:761C10213FAB32FF2F639ACBBD788400E51AE71E8AF26A586697B902212299EB
3888WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:68DFDD0F3E5D7D504747CFE0F8B88998
SHA256:A7B9E0899977956CA5A3E87DE4C87D4E86286865750CBB2D1ED23861F3992672
3888WINWORD.EXEC:\Users\admin\Desktop\~$rsonway.rtfpgc
MD5:03F8CC2C2A44EFA4A0BC0183005F8C23
SHA256:413666C601A0F51658BE3300F4156C5026DDEB9662602C801F695E054D5CEBB5
2464UoEanuck.exeC:\Users\admin\Desktop\modedog.jpg.shinobinary
MD5:02B29B904279D5325668B095EF8D7CC9
SHA256:ACDD47FA951E2748E0605A63A8F6A33FA4779F794C5590B0E70A82DC3B3FD2C3
2464UoEanuck.exeC:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\$RTTIPAF.jpgimage
MD5:51DFCB1A7F5D3B38EEE1D7B321E4559A
SHA256:174E4A133E9C5396C8F144A17E28CF39BC2581CA4280EF71FBE352BB8087E781
3888WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9EC89FAE-B808-40A1-8E5C-FB16B2A50F2F}.tmpdbf
MD5:3697D0E6263DB5F37956FF726F793FAE
SHA256:44C0A08C0434E6D57896E337BD89932A22B78494286DE3D822E02BD611D278AB
3888WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{BF5336F0-99B1-47B6-85D2-33C25D15DD3F}.tmpbinary
MD5:DB7E73441B08E32DC312E19D39BB704B
SHA256:6586C088FB91B6FCFAC90415C9E552FE4DECA45A2C305019D845B611DAE5A016
2268setup.exeC:\Users\admin\AppData\Local\Temp\UoEanuck.exeexecutable
MD5:C139B1B02DF2BB767206A8AEF33F20DD
SHA256:6AEF2A20079A06566BB57277E587FF6DE38A92F7C7FEDA0FB341CFAF3AA13834
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
74
DNS requests
33
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2608
iexplore.exe
GET
200
2.16.186.11:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgMbL0lapHWmrJL10xXjV6dmXA%3D%3D
unknown
der
503 b
shared
2608
iexplore.exe
GET
200
2.16.186.11:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgRoQ%2BeEq3lrU2pMOeBuF9yc%2Fg%3D%3D
unknown
der
503 b
shared
2608
iexplore.exe
GET
200
104.110.191.140:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?fa95f0b7e5523a98
US
compressed
60.9 Kb
whitelisted
2608
iexplore.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEB%2Fvu3PmotRDEvKn%2FiRyWpo%3D
US
der
471 b
whitelisted
2608
iexplore.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2608
iexplore.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQC4cghLP0ph1RJpf5DiA7jZ
US
der
472 b
whitelisted
3756
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2608
iexplore.exe
GET
200
104.110.191.140:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?91511cc48e218cfc
US
compressed
60.9 Kb
whitelisted
2608
iexplore.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2608
iexplore.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCgVmpFkizRxRLqxUFbbeRm
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2608
iexplore.exe
2.16.186.11:80
r3.o.lencr.org
Akamai International B.V.
DE
whitelisted
2608
iexplore.exe
142.250.187.110:443
www.youtube.com
GOOGLE
US
whitelisted
2268
setup.exe
188.166.237.163:443
shinolocker.com
DIGITALOCEAN-ASN
SG
malicious
2608
iexplore.exe
104.110.191.140:80
ctldl.windowsupdate.com
Akamai International B.V.
NL
unknown
2608
iexplore.exe
188.166.237.163:443
shinolocker.com
DIGITALOCEAN-ASN
SG
malicious
2608
iexplore.exe
185.44.104.99:443
ra.revolvermaps.com
meerfarbig GmbH & Co. KG
DE
suspicious
2608
iexplore.exe
23.45.105.185:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
2608
iexplore.exe
142.250.184.195:80
ocsp.pki.goog
GOOGLE
US
whitelisted
3756
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
3756
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
shinolocker.com
  • 188.166.237.163
unknown
dns.msftncsi.com
  • 131.107.255.255
shared
ctldl.windowsupdate.com
  • 104.110.191.140
  • 104.110.191.133
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted
r3.o.lencr.org
  • 2.16.186.11
  • 2.16.186.10
shared
ra.revolvermaps.com
  • 185.44.104.99
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.youtube.com
  • 142.250.187.110
  • 142.250.187.142
  • 142.250.187.174
  • 172.217.17.110
  • 172.217.17.142
  • 172.217.20.78
  • 216.58.206.174
  • 216.58.206.206
  • 172.217.169.110
  • 172.217.169.142
  • 172.217.169.174
  • 172.217.17.238
  • 216.58.214.142
  • 142.250.184.142
whitelisted
shinosec.com
  • 128.199.83.111
suspicious

Threats

Found threats are available for the paid subscriptions
14 ETPRO signatures available at the full report
No debug info