File name:

GB.exe

Full analysis: https://app.any.run/tasks/15e16048-b697-4462-8146-799b09fcb087
Verdict: Malicious activity
Analysis date: April 29, 2025, 18:32:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

C8C2AF0EFA1C9510AE9BFDF5B25D1098

SHA1:

1F111E3CC203DB4FE51179881662F71BA2A88103

SHA256:

FEA7E7A1230FD2D57848E9148D876E9A0C42C0DE1E5E5EE198A80CC8A6996FD3

SSDEEP:

98304:EaeKX+VtcE2zDRrSe1UfTepMk/80vMck+rhIC79IcktIf9Ds8phCGLNy6ukMJdzM:UYvkDZK7Y6jzPmr/cz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • reg.exe (PID: 1052)
      • reg.exe (PID: 5892)
      • reg.exe (PID: 5720)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 1188)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1188)
    • Uses TASKKILL.EXE to kill antiviruses

      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 7240)
      • cmd.exe (PID: 8184)
      • cmd.exe (PID: 6028)
      • cmd.exe (PID: 7728)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • xcopy.exe (PID: 7036)
      • cmd.exe (PID: 1188)
    • Reads security settings of Internet Explorer

      • GB.exe (PID: 2340)
    • The process executes VB scripts

      • GB.exe (PID: 2340)
      • cmd.exe (PID: 1188)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 1764)
      • Microsoft0leSystemmcas.exe (PID: 6040)
      • Winlog0nUser.exe (PID: 2320)
      • wscript.exe (PID: 1324)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 1764)
      • wscript.exe (PID: 1324)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 1188)
      • cmd.exe (PID: 4488)
    • Process drops legitimate windows executable

      • Rar.exe (PID: 5332)
      • cmd.exe (PID: 1188)
    • Process copies executable file

      • cmd.exe (PID: 1188)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1188)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 900)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1188)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1764)
      • wscript.exe (PID: 1324)
    • Uses WMIC.EXE to obtain information about the network interface controller

      • cmd.exe (PID: 1052)
    • There is functionality for taking screenshot (YARA)

      • Winlog0nUser.exe (PID: 2320)
    • Connects to unusual port

      • Winlog0nUser.exe (PID: 2320)
  • INFO

    • Checks supported languages

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • Microsoft0leSystemmcas.exe (PID: 6040)
      • Winlog0nUser.exe (PID: 2320)
      • zl.exe (PID: 4944)
      • SndCab.exe (PID: 5504)
    • Reads the computer name

      • GB.exe (PID: 2340)
      • SndCab.exe (PID: 5504)
      • Winlog0nUser.exe (PID: 2320)
    • The sample compiled with english language support

      • GB.exe (PID: 2340)
      • Rar.exe (PID: 5332)
      • xcopy.exe (PID: 7036)
      • cmd.exe (PID: 1188)
    • Process checks computer location settings

      • GB.exe (PID: 2340)
    • Reads the machine GUID from the registry

      • Rar.exe (PID: 5332)
    • Creates a new folder

      • cmd.exe (PID: 2096)
      • cmd.exe (PID: 904)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 5552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:27 20:03:27+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 190976
InitializedDataSize: 326656
UninitializedDataSize: -
EntryPoint: 0x1d759
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
195
Monitored processes
64
Malicious processes
3
Suspicious processes
12

Behavior graph

Click at the process to see the details
start gb.exe wscript.exe no specs cmd.exe conhost.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs rar.exe xcopy.exe xcopy.exe no specs regsvr32.exe no specs schtasks.exe no specs sppextcomobj.exe no specs slui.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe reg.exe reg.exe winlog0nuser.exe microsoft0lesystemmcas.exe no specs zl.exe no specs sndcab.exe no specs attrib.exe no specs cmd.exe no specs attrib.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs gb.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
812"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
900regsvr32 /s C:\WINDOWS\Syswow64\mswinsck.ocxC:\Windows\SysWOW64\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
904cmd /c mkdir "tmp\tmp"C:\Windows\SysWOW64\cmd.exeWinlog0nUser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1052reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v MicrosoftUptadeTool /d "cmd /c cd C:\Intel\Drv & start C:\Intel\Drv\Microsoft0leSystemmcas.exe"C:\Windows\SysWOW64\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
1052cmd /c wmic NIC LIST BRIEF > "C:\Intel\Drv\tmp\tmp\tmp7055.tmp"C:\Windows\SysWOW64\cmd.exeWinlog0nUser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1188C:\WINDOWS\system32\cmd.exe /c ""C:\TEMP\new.bat" "C:\Windows\SysWOW64\cmd.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1324taskkill /im Winlog0nuser.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1324"C:\WINDOWS\System32\WScript.exe" "C:\TEMP\close.vbs" C:\Windows\SysWOW64\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
1660taskkill /im MsMpEngCPo.exe /fC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 673
Read events
4 659
Write events
11
Delete events
3

Modification events

(PID) Process:(2340) GB.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:c%%TEMP%
Value:
c:\TEMP\
(PID) Process:(2340) GB.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}
Operation:delete keyName:(default)
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}
Operation:delete keyName:(default)
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32
Operation:delete valueName:ThreadingModel
Value:
(PID) Process:(1052) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftUptadeTool
Value:
cmd /c cd C:\Intel\Drv & start C:\Intel\Drv\Microsoft0leSystemmcas.exe
(PID) Process:(1188) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(900) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
10
Suspicious files
37
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2340GB.exeC:\TEMP\inst.rar
MD5:
SHA256:
5332Rar.exeC:\Intel\Drv\spss.dat
MD5:
SHA256:
2340GB.exeC:\TEMP\close.vbstext
MD5:8C7B0DADD914F0A3ECDC45D596D55A76
SHA256:4B18745BDE5DA464ED6E34E3E6B10EFF6F7D75B80AD5D851F07C352123DCE7D1
2340GB.exeC:\TEMP\InstalltoolConsole.vbstext
MD5:37894433BA79853954D3F5F1209DD1AD
SHA256:CB74E08D23C70DDE7F6EFEBFEE49563E569CCFFF1541C9D5D96842FC8E8926B3
5332Rar.exeC:\Intel\Drv\LOCAL.txttext
MD5:99A29DC8105FD2FA39D8CDC04733938D
SHA256:9AED541153E3F39CC0B4CFD1D2B1B1D2C99F660742055147505E7E8F5EF08070
2340GB.exeC:\TEMP\Rar.exeexecutable
MD5:C63E87A329F21C9CE3794D47647FCDC9
SHA256:E904F95AEADE4268AEDDD6D0FA9B867FBA789998ABF53C386D295F4E779B429F
5332Rar.exeC:\Intel\Drv\PrinterC0MMpf.dllexecutable
MD5:1E5961824C2A9E86192DECE20D6B7A14
SHA256:ED9B6D6A94470F4C925178DA92DC8CD3B3DBB3B8AEA741DDDE226546BF807FE1
5332Rar.exeC:\Intel\Drv\rcfg.datbinary
MD5:E0A706E760D960C2AE7CC6258A08E21C
SHA256:BAA624E71589F88190C2196CCEF0B2F034CC535DA2560FEDD3081CEF7AF59EBD
5332Rar.exeC:\Intel\Drv\Microsoft0leSystemmcas.exeexecutable
MD5:BFB88023C7303225BE332C4BE640E65F
SHA256:2056AA655B4ED125B7637F1BBC6C9CAC0D5144A4467728E3DC0F0A7B86162258
5332Rar.exeC:\Intel\Drv\MSWINSCK.OCXexecutable
MD5:9484C04258830AA3C2F2A70EB041414C
SHA256:BF7E47C16D7E1C0E88534F4EF95E09D0FD821ED1A06B0D95A389B35364B63FF5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
24
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.22.98.7:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
5496
MoUsoCoreWorker.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
4
System
192.168.100.255:138
whitelisted
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 172.217.168.206
whitelisted
crl.microsoft.com
  • 2.18.121.139
whitelisted
www.microsoft.com
  • 23.200.189.225
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 2.22.98.7
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
aaba919bhttps.clouddns.ph
  • 45.79.222.138
unknown

Threats

No threats detected
No debug info