File name:

2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit

Full analysis: https://app.any.run/tasks/eb272edd-2d1f-4723-bf45-ae3e70e9ab5d
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: April 20, 2025, 16:31:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
lockbit
stealer
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

04463F29330F85B617F686CA56F5D59C

SHA1:

73372115326CBE0309198207E089A93332F76F68

SHA256:

37BD15C4B02A4E8271590CA9D448E1340CBBDDA44EA3F46F199BF2C047C33DFF

SSDEEP:

3072:OmhXodguLLDzaJ/A7z7zT73pyaxxrbovi57NnCfq:2fza6z7z9xrki5xnR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 7508)
    • RANSOMWARE has been detected

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • Renames files like ransomware

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • Steals credentials from Web Browsers

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • [YARA] LockBit is detected

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 7820)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • There is functionality for taking screenshot (YARA)

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
  • INFO

    • Checks supported languages

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7312)
      • ShellExperienceHost.exe (PID: 7820)
      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
      • SearchApp.exe (PID: 5008)
    • Reads the computer name

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7312)
      • ShellExperienceHost.exe (PID: 7820)
      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
      • SearchApp.exe (PID: 5008)
    • Reads the machine GUID from the registry

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7312)
      • SearchApp.exe (PID: 5008)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 7508)
    • Creates files in the program directory

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • Creates files or folders in the user directory

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • Manual execution by a user

      • wscript.exe (PID: 1512)
      • wscript.exe (PID: 6964)
      • OpenWith.exe (PID: 2516)
    • Create files in a temporary directory

      • 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe (PID: 7556)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 2516)
    • Checks proxy server information

      • SearchApp.exe (PID: 5008)
    • Reads the software policy settings

      • SearchApp.exe (PID: 5008)
    • Process checks computer location settings

      • SearchApp.exe (PID: 5008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:13 23:30:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.12
CodeSize: 99328
InitializedDataSize: 50688
UninitializedDataSize: -
EntryPoint: 0x1946f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe no specs CMSTPLUA THREAT 2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe shellexperiencehost.exe no specs wscript.exe no specs wscript.exe no specs openwith.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\background.jsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2516"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\manifest.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5008"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\combase.dll
6964"C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\main.jsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7312"C:\Users\admin\Desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe" C:\Users\admin\Desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
7508C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
7556"C:\Users\admin\Desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe" C:\Users\admin\Desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\2025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\win32u.dll
7820"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
Total events
8 603
Read events
8 554
Write events
48
Delete events
1

Modification events

(PID) Process:(7508) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(7820) ShellExperienceHost.exeKey:\REGISTRY\A\{a767b79e-96b5-8329-8a92-9cf17d4d67e4}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D0000000FEEA5B911B2DB01
(PID) Process:(7820) ShellExperienceHost.exeKey:\REGISTRY\A\{a767b79e-96b5-8329-8a92-9cf17d4d67e4}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D0000000507A9B911B2DB01
(PID) Process:(5008) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(5008) SearchApp.exeKey:\REGISTRY\A\{1e3aa0e7-93bf-6cf1-b067-2ba445ddaab2}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
000042D195F611B2DB01
(PID) Process:(5008) SearchApp.exeKey:\REGISTRY\A\{1e3aa0e7-93bf-6cf1-b067-2ba445ddaab2}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
000042D195F611B2DB01
(PID) Process:(5008) SearchApp.exeKey:\REGISTRY\A\{1e3aa0e7-93bf-6cf1-b067-2ba445ddaab2}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
4E006F006E006500000042D195F611B2DB01
(PID) Process:(5008) SearchApp.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\A1hdl50UVDh2ZbG324Nx-6fZgntcGnHOs5kHLdmaJYE\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN
(PID) Process:(5008) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsMSACloudSearchEnabled
Value:
0
(PID) Process:(5008) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsAADCloudSearchEnabled
Value:
0
Executable files
15
Suspicious files
1 765
Text files
1 907
Unknown types
0

Dropped files

PID
Process
Filename
Type
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\mXWb45OeA.README.txttext
MD5:D99BD52363F7F2B9FA41B361B18D2E38
SHA256:E930062A06429D603F855E265860DB6AE3ABB1C0F75EB38C049A5BFDC45D4BA8
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\FFFFFFFFFFFbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\ProgramData\mXWb45OeA.icoimage
MD5:88D9337C4C9CFE2D9AFF8A2C718EC76B
SHA256:95E059EF72686460884B9AEA5C292C22917F75D56FE737D43BE440F82034F438
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\DDDDDDDDDDDbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\AAAAAAAAAAAbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\EEEEEEEEEEEbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\GGGGGGGGGGGbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\HHHHHHHHHHHbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\BBBBBBBBBBBbinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
75562025-04-20_04463f29330f85b617f686ca56f5d59c_darkside_elex_lockbit.exeC:\$Recycle.Bin\S-1-5-18\desktop.inibinary
MD5:D106B11DCD332F8C2CA72B957CF0FF5F
SHA256:8498851E941DC635B50B642CB898E057D0950F2650C6EEC57CEDDA6E40277809
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
22
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1072
RUXIMICS.exe
GET
200
2.17.147.64:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.17.147.64:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1072
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
92.123.104.17:443
https://www.bing.com/rp/4BpQ1bD8vX1mXuJObN-gg9RqkyQ.br.js
unknown
GET
200
92.123.104.9:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
3.47 Kb
whitelisted
GET
200
92.123.104.22:443
https://www.bing.com/rb/6i/cir3,ortl,cc,nc/n10LjisNGF0pbpqUul3Eng9PpC8.css?bu=M9UKzwrbCs8KvwvPCsULzwrPCs8K0AvPCtcLzwrdC88K4wvPCukLzwrtCs8K8wrPCucKzwrPCrYLzwqCC88KiAvPCvwKzwqOC5gLmwvPCs8KswuhC88KpwuqC88KlQzPCu8LzwrQDA&or=w
unknown
text
459 Kb
whitelisted
GET
200
92.123.104.17:443
https://www.bing.com/rb/19/cir3,ortl,cc,nc/EdGMywLcB7jTlSP4Cnh3fVWBpmk.css?bu=B88CRr0CrQFhYdgC&or=w
unknown
text
6.30 Kb
whitelisted
POST
204
92.123.104.10:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
GET
200
92.123.104.11:443
https://www.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=DyIrb3t-gQF4cnWyAbUBK6UBK7gB&or=w
unknown
binary
21.3 Kb
whitelisted
GET
200
92.123.104.23:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
unknown
html
129 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1072
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.17.147.64:80
crl.microsoft.com
Akamai International B.V.
CZ
whitelisted
1072
RUXIMICS.exe
2.17.147.64:80
crl.microsoft.com
Akamai International B.V.
CZ
whitelisted
1072
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5008
SearchApp.exe
92.123.104.11:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.17.147.64
  • 2.17.147.99
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.11
  • 92.123.104.10
  • 92.123.104.23
  • 92.123.104.7
  • 92.123.104.17
  • 92.123.104.19
  • 92.123.104.18
  • 92.123.104.22
  • 92.123.104.9
whitelisted

Threats

No threats detected
No debug info