Windows
Analysis Report
SecurityHealthSystray.exe
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
SecurityHealthSystray.exe (PID: 6904 cmdline:
"C:\Users\ user\Deskt op\Securit yHealthSys tray.exe" MD5: EDD7BD6B0936AF19C0858AAF2E12D543)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_KimaLogger | Yara detected KimaLogger | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_KimaLogger | Yara detected KimaLogger | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_KimaLogger | Yara detected KimaLogger | Joe Security | ||
JoeSecurity_KimaLogger | Yara detected KimaLogger | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process Stats: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: |
Source: | ReversingLabs: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: |
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Evasive API call chain: |
Source: | Thread sleep count: |
Source: | API call chain: | ||
Source: | API call chain: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Code function: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Native API | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 3 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | Win64.Spyware.Klogexe | ||
100% | Avira | HEUR/AGEN.1311191 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1567841 |
Start date and time: | 2024-12-03 22:39:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 43s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecurityHealthSystray.exe |
Detection: | MAL |
Classification: | mal64.spyw.winEXE@1/1@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W MIADAP.exe, SIHClient.exe, con host.exe - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, slscr.update.microsoft.co m, otelrules.azureedge.net, ct ldl.windowsupdate.com, fe3cr.d elivery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: Securi
tyHealthSystray.exe
Process: | C:\Users\user\Desktop\SecurityHealthSystray.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 252 |
Entropy (8bit): | 2.7608290872874175 |
Encrypted: | false |
SSDEEP: | 6:QavElZi8rprS2a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0n:QhlYeprkFFFFFFFFFFFFFFFF0 |
MD5: | BDA43B8103F3E5C55A805BF8693E5336 |
SHA1: | B5D53A3EE77652921B440BF04C99408E348061CC |
SHA-256: | A97028DBE4173F5736836DC9C6CC6235018093D4CDABE776F2EEBD955DDE4227 |
SHA-512: | 0006087EF909C15C114553EE0242D2472E7DF13989814E65DD3C1F88D1D5569701182A897019A6424A3D603F643A96B74F8E7D4A9122F8A90C93AB9626EBFCDA |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 4.059224918718081 |
TrID: |
|
File name: | SecurityHealthSystray.exe |
File size: | 264'192 bytes |
MD5: | edd7bd6b0936af19c0858aaf2e12d543 |
SHA1: | 2fd507b0eb1d124ba36f2897e9830be9926330c5 |
SHA256: | 3af5c9759d95fd6091e665c03406f275fac26afe70db067a785cdc003389efbd |
SHA512: | fae5b6da5767539509eecb8c65996bbe396f72f505b238ef2ea79ad2ce9b640a84bd09483728b0cbc4a6b0709bf6a0120ade83e542a516a7d9608bf5d08ca233 |
SSDEEP: | 3072:74NmT9GpamcAShwlumlhA+QX24yAb0OOMSqPqBf:EgTj2lJlOBX2ZyV1 |
TLSH: | A5443A3B25C8F2BAD016963CC822BAF697796CE9CD24424FEE503E463D329F05D76611 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S............^.`.....^.a.....^.b.............f.........|.......f.......8.......c.....Rich............................PE..d.. |
Icon Hash: | 0fe88caecc6d2b8e |
Entrypoint: | 0x1400033b4 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66ED69F5 [Fri Sep 20 12:26:29 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 8f1164a9de43785702fb4f059bb0072e |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F5FFD27419Ch |
dec eax |
add esp, 28h |
jmp 00007F5FFD2717C7h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
cmp ecx, dword ptr [00014CF9h] |
jne 00007F5FFD271963h |
dec eax |
rol ecx, 10h |
test cx, FFFFh |
jne 00007F5FFD271954h |
rep ret |
dec eax |
ror ecx, 10h |
jmp 00007F5FFD271C32h |
int3 |
inc eax |
push ebx |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, ecx |
mov byte ptr [ecx+18h], 00000000h |
dec eax |
test edx, edx |
jne 00007F5FFD2719D8h |
call 00007F5FFD2730AEh |
dec eax |
mov dword ptr [ebx+10h], eax |
dec eax |
mov edx, dword ptr [eax+000000C0h] |
dec eax |
mov dword ptr [ebx], edx |
dec eax |
mov ecx, dword ptr [eax+000000B8h] |
dec eax |
mov dword ptr [ebx+08h], ecx |
dec eax |
cmp edx, dword ptr [00015635h] |
je 00007F5FFD271968h |
mov eax, dword ptr [eax+000000C8h] |
test dword ptr [00015793h], eax |
jne 00007F5FFD27195Ah |
call 00007F5FFD274B4Dh |
dec eax |
mov dword ptr [ebx], eax |
dec eax |
mov eax, dword ptr [00014E9Eh] |
dec eax |
cmp dword ptr [ebx+08h], eax |
je 00007F5FFD27196Dh |
dec eax |
mov eax, dword ptr [ebx+10h] |
mov ecx, dword ptr [eax+000000C8h] |
test dword ptr [0001576Ch], ecx |
jne 00007F5FFD27195Bh |
call 00007F5FFD274F1Eh |
dec eax |
mov dword ptr [ebx+08h], eax |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x17490 | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x60000 | 0x15c20 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x5f000 | 0xd38 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x76000 | 0x760 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x15fa0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x10000 | 0x348 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xe77f | 0xe800 | 3d96659b004b303097d5a9f73467fe13 | False | 0.5720804148706896 | data | 6.371487214073958 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x10000 | 0x7f80 | 0x8000 | d04410aea3e151ad0e720e38abf3ce0d | False | 0.357177734375 | data | 4.833710150136232 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x18000 | 0x46390 | 0x11c00 | 83d8b240398e0d88306a0b08a8993bab | False | 0.02970950704225352 | data | 0.5080376891405495 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x5f000 | 0xd38 | 0xe00 | daee39f158a730dea5885a598a6680f8 | False | 0.46763392857142855 | data | 4.700701060805498 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x60000 | 0x15c20 | 0x15e00 | a95ff6923e8f9741a0b33e86ea11cb71 | False | 0.09213169642857143 | data | 2.2190492766512606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x76000 | 0x129a | 0x1400 | 8d374c9c57dced6023d50d06161d1740 | False | 0.207421875 | data | 2.7477630625611127 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x604f0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Korean | North Korea | 0.23049645390070922 |
RT_ICON | 0x604f0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Korean | South Korea | 0.23049645390070922 |
RT_ICON | 0x60958 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1600 | Korean | North Korea | 0.19476744186046513 |
RT_ICON | 0x60958 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1600 | Korean | South Korea | 0.19476744186046513 |
RT_ICON | 0x61010 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Korean | North Korea | 0.14672131147540984 |
RT_ICON | 0x61010 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Korean | South Korea | 0.14672131147540984 |
RT_ICON | 0x61998 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Korean | North Korea | 0.1198405253283302 |
RT_ICON | 0x61998 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Korean | South Korea | 0.1198405253283302 |
RT_ICON | 0x62a40 | 0x1a68 | Device independent bitmap graphic, 40 x 80 x 32, image size 6400 | Korean | North Korea | 0.09437869822485206 |
RT_ICON | 0x62a40 | 0x1a68 | Device independent bitmap graphic, 40 x 80 x 32, image size 6400 | Korean | South Korea | 0.09437869822485206 |
RT_ICON | 0x644a8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Korean | North Korea | 0.08246887966804979 |
RT_ICON | 0x644a8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Korean | South Korea | 0.08246887966804979 |
RT_ICON | 0x66a50 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | Korean | North Korea | 0.06170288143599433 |
RT_ICON | 0x66a50 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | Korean | South Korea | 0.06170288143599433 |
RT_ICON | 0x6ace0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Korean | North Korea | 0.23049645390070922 |
RT_ICON | 0x6ace0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Korean | South Korea | 0.23049645390070922 |
RT_ICON | 0x6b148 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1600 | Korean | North Korea | 0.19476744186046513 |
RT_ICON | 0x6b148 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1600 | Korean | South Korea | 0.19476744186046513 |
RT_ICON | 0x6b800 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Korean | North Korea | 0.14672131147540984 |
RT_ICON | 0x6b800 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Korean | South Korea | 0.14672131147540984 |
RT_ICON | 0x6c188 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Korean | North Korea | 0.1198405253283302 |
RT_ICON | 0x6c188 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Korean | South Korea | 0.1198405253283302 |
RT_ICON | 0x6d230 | 0x1a68 | Device independent bitmap graphic, 40 x 80 x 32, image size 6400 | Korean | North Korea | 0.09437869822485206 |
RT_ICON | 0x6d230 | 0x1a68 | Device independent bitmap graphic, 40 x 80 x 32, image size 6400 | Korean | South Korea | 0.09437869822485206 |
RT_ICON | 0x6ec98 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Korean | North Korea | 0.08246887966804979 |
RT_ICON | 0x6ec98 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Korean | South Korea | 0.08246887966804979 |
RT_ICON | 0x71240 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | Korean | North Korea | 0.06170288143599433 |
RT_ICON | 0x71240 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | Korean | South Korea | 0.06170288143599433 |
RT_MENU | 0x754d0 | 0x4a | data | English | United States | 0.8648648648648649 |
RT_DIALOG | 0x75530 | 0x134 | data | English | United States | 0.5844155844155844 |
RT_STRING | 0x75a60 | 0x3c | data | English | United States | 0.6166666666666667 |
RT_ACCELERATOR | 0x75520 | 0x10 | data | English | United States | 1.25 |
RT_GROUP_ICON | 0x6ac78 | 0x68 | data | Korean | North Korea | 0.7596153846153846 |
RT_GROUP_ICON | 0x6ac78 | 0x68 | data | Korean | South Korea | 0.7596153846153846 |
RT_GROUP_ICON | 0x75468 | 0x68 | data | Korean | North Korea | 0.7884615384615384 |
RT_GROUP_ICON | 0x75468 | 0x68 | data | Korean | South Korea | 0.7884615384615384 |
RT_VERSION | 0x75668 | 0x3f4 | data | English | United States | 0.43873517786561267 |
RT_MANIFEST | 0x75aa0 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | ExitProcess, Sleep, GetProcAddress, LoadLibraryA, GetLastError, MultiByteToWideChar, EnterCriticalSection, LeaveCriticalSection, CloseHandle, GetFileSize, lstrlenA, GetTickCount, CreateFileA, SetFilePointer, WriteFile, GetLocalTime, lstrcpyA, GlobalLock, lstrcatA, DeleteFileA, InitializeCriticalSection, OpenEventW, DeleteCriticalSection, OutputDebugStringW, WideCharToMultiByte, CreateFileW, ReadFile, WriteConsoleW, SetStdHandle, HeapReAlloc, SetFilePointerEx, GetConsoleMode, GetConsoleCP, LCMapStringEx, GetStringTypeW, LoadLibraryW, LoadLibraryExW, HeapSize, RaiseException, RtlPcToFileHeader, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, RtlUnwindEx, GetCommandLineW, HeapFree, IsDebuggerPresent, IsProcessorFeaturePresent, EncodePointer, DecodePointer, HeapAlloc, GetSystemTimeAsFileTime, SetLastError, GetCurrentThreadId, GetModuleHandleExW, GetStdHandle, GetModuleFileNameW, GetProcessHeap, GetFileType, InitializeCriticalSectionAndSpinCount, InitOnceExecuteOnce, GetStartupInfoW, QueryPerformanceCounter, GetTickCount64, GetEnvironmentStringsW, FreeEnvironmentStringsW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetCurrentProcess, TerminateProcess, GetModuleHandleW, FlushFileBuffers |
USER32.dll | LoadIconW, GetWindowLongW, RegisterClassExW, GetWindowTextA, LoadCursorW, LoadStringW, EndDialog, PostQuitMessage, EndPaint, BeginPaint, DefWindowProcW, DestroyWindow, DialogBoxParamW |
SHELL32.dll | SHGetSpecialFolderPathA |
WININET.dll | InternetOpenW, InternetConnectW, HttpOpenRequestW, HttpSendRequestExW, InternetWriteFile, HttpEndRequestA, InternetCloseHandle |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Korean | North Korea | |
Korean | South Korea | |
English | United States |
Target ID: | 0 |
Start time: | 16:39:53 |
Start date: | 03/12/2024 |
Path: | C:\Users\user\Desktop\SecurityHealthSystray.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7237c0000 |
File size: | 264'192 bytes |
MD5 hash: | EDD7BD6B0936AF19C0858AAF2E12D543 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |