Windows
Analysis Report
e73fd063-ee8a-a9c6-f391-834415836051.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 7084 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\e73f d063-ee8a- a9c6-f391- 8344158360 51.eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 2488 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "39D 5AE5F-278B -4B07-A02C -37C9C7DFD 5E7" "969B D495-0C59- 4644-953F- 3B2F2050D1 24" "7084" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-msedge.net | 52.123.129.14 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1675776 |
Start date and time: | 2025-04-28 03:04:35 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | e73fd063-ee8a-a9c6-f391-834415836051.eml |
Detection: | MAL |
Classification: | mal48.winEML@3/3@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, SIHClient.exe, Sgr mBroker.exe, conhost.exe, Text InputHost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.20.38, 69.1 92.44.226, 20.42.73.28, 52.123 .129.14, 20.109.210.53 - Excluded domains from analysis
(whitelisted): ecs.office.com , fs.microsoft.com, slscr.upda te.microsoft.com, prod.configs vc1.live.com.akadns.net, scus- azsc-config.officeapps.live.co m, fs-wildcard.microsoft.com.e dgekey.net, fs-wildcard.micros oft.com.edgekey.net.globalredi r.akadns.net, e16604.dscf.akam aiedge.net, mobile.events.data .microsoft.com, fe3cr.delivery .mp.microsoft.com, dual-s-0005 -office.config.skype.com, otel rules.svc.static.microsoft, co nfig.officeapps.live.com, us.c onfigsvc1.live.com.akadns.net, officeclient.microsoft.com, o nedscolprdeus15.eastus.cloudap p.azure.com, ecs.office.traffi cmanager.net, prod.fs.microsof t.com.akadns.net, mobile.event s.data.trafficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XRed | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 4.509708350101463 |
Encrypted: | false |
SSDEEP: | 768:lT6qbNa6HdzpQLeYerfjy47O99r5t1HaLXhv91WdWLhCI97EC:Zs4709r5t4XllCC |
MD5: | 74F04B131E3054AE780FD45361C41A22 |
SHA1: | 1437D247DB851A3E5F09EB30BFEFB789C821DE96 |
SHA-256: | 38B1D11CA020CDE61134A44A9CEA08862A62592F3FF9CBC8417BCE820699E871 |
SHA-512: | 2B144FB502AB35619661C7BB82844DA19F7299522FDB8D88DA7A7D7D021872A9D93DC5AF20C026AC3019D1214783E5424E8C5F3218982C441E9E0F52018A87B0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.943422465941738 |
Encrypted: | false |
SSDEEP: | 6144:Yy+lFCEkNCEkrCEkaCEk/CEkICEkiXCEk+R5C:UFCEkNCEkrCEkaCEk/CEkICEkiXCEk |
MD5: | C7D39AC37F63768E6600073DE68DA047 |
SHA1: | DFDD5CE6FA120D93918A832C677C9AB53AC77293 |
SHA-256: | 1A3441F8EEF05ED542BE55ADDE65F3275F49923D973A87E20A57C905E21D1DF9 |
SHA-512: | 23076FD0A76667EB6E5A67597453AB7DAEDF5F2A0ABC96AB3224A1FB168E510C1EFC1CDF1F4E0FD274DF35D4EA341584ECD3E054376608EEB764E705C180D131 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 3.8263909122812763 |
Encrypted: | false |
SSDEEP: | 1536:OW53jEpEHP4qQ10PAwr1hDOncCEkiXCEko0QlKjikW53jEpEHP4qQ10PAwrkwo+s:8p9jcCEkiXCEkwmp9DGfw |
MD5: | 912FB69A1F02BEBEA5AFBA18909ED924 |
SHA1: | D357E891326255DC7B221DADA41EA467BA59FF30 |
SHA-256: | C1AD03D8F4DB3ED7572F2A44F8AF3EED94F13A8978F01AD3A90589CFFD19A120 |
SHA-512: | 5B2C0BD78E684659C0D739D2240FA97D58FE973BBA2737EB69695D6787169F84BD2B712B8A8CE3098CE4C846CEEF6CFDA13743416BE9967C5B132EA2AA7D07C5 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.598046075570246 |
TrID: |
|
File name: | e73fd063-ee8a-a9c6-f391-834415836051.eml |
File size: | 30'643 bytes |
MD5: | 0591a0d418cea56e92360436de6df692 |
SHA1: | c890f388ad9b5d68f031b6bf68c6d8382bef024b |
SHA256: | 2fb0e5872be17ec630de5c356b94cf7892bec16ebf0c06dd197c34e8f7137689 |
SHA512: | 91d041a1f768741b9f169eb9901cafb04255d1d564dd300f3510086ee276c0fed94effc3bff9459620ef145f9825e183f3cbfd003e0cff4c248359ea7dd99b9b |
SSDEEP: | 384:aZsoS3TFrriSzFTfKSiz61To/iEK4RFBS/IpIkpi/t:aZw3VrispKSiz61To/iEKwFBS/APi/t |
TLSH: | 3BD2D517E7C01C11DE6B48A06543377DBB7849DB8B6288B468AB7F3E0B4DCE782C5248 |
File Content Preview: | Received: from SY8PR01MB9300.ausprd01.prod.outlook.com (2603:10c6:10:22e::19).. by ME2PR01MB3572.ausprd01.prod.outlook.com with HTTPS; Wed, 16 Apr 2025.. 14:14:02 +0000..Received: from SY6PR01CA0075.ausprd01.prod.outlook.com (2603:10c6:10:110::8).. by SY8 |
Subject: | New(2) electronic signature/16/Apr/25JUREFIDREFID:156aeeca716ce806390a |
From: | DigiSigner_eSign-9282 <notice@qc.disneytech.asia> |
To: | gillian.nichols@skills.tas.gov.au |
Cc: | |
BCC: | |
Date: | Wed, 16 Apr 2025 14:13:54 +0000 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from e232-8.smtp-out.ap-southeast-1.amazonses.com (23.251.232.8) by SY3PEPF0000A725.mail.protection.outlook.com (10.167.241.21) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8655.12 via Frontend Transport; Wed, 16 Apr 2025 14:13:55 +0000 |
Authentication-Results | spf=pass (sender IP is 23.251.232.8) smtp.mailfrom=ap-southeast-1.amazonses.com; dkim=pass (signature was verified) header.d=qc.disneytech.asia;dkim=pass (signature was verified) header.d=amazonses.com;dmarc=pass action=none header.from=qc.disneytech.asia;compauth=pass reason=100 |
Received-SPF | Pass (protection.outlook.com: domain of ap-southeast-1.amazonses.com designates 23.251.232.8 as permitted sender) receiver=protection.outlook.com; client-ip=23.251.232.8; helo=e232-8.smtp-out.ap-southeast-1.amazonses.com; pr=C |
DKIM-Signature | v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=iowwo7fd7wqffpmrry5t52h55zq2wg7s; d=amazonses.com; t=1744812834; h=Message-ID:From:To:Subject:Date:MIME-Version:Content-Type:Feedback-ID; bh=cTVo6d8pJ7YdNlURfXChzo1+lRyyq/F1CjdThnLaJ1Q=; b=XUKcm3PRA1iYMp/c3uk+iIv7MyOnKwjXww51sCfX2/KSKcnYXeyrsGpICuWiGREK NANxnZKsLcbf/ugDq25t46vxDO0xhonogd03Y/XXWa2SnjOCkHFUsKCEGLLuivDlH8p /oxxwEmq1ay6g+9ZYkpvuyiqQzW4YEDgHkP6I3Dw= |
Message-ID | <010e01963ef2fe60-81dfddf9-aae8-44c6-a84f-2da8f9b164b0-000000@ap-southeast-1.amazonses.com> |
X-Entity-Ref-ID | fba83b9ebc5b61522192b1bc5d6b52bca5ac129cf6f145846ba8dfaa072cdc78 |
X-Campaign-ID | campaign-c0154cc627e5 |
From | DigiSigner_eSign-9282 <notice@qc.disneytech.asia> |
To | gillian.nichols@skills.tas.gov.au |
Subject | New(2) electronic signature/16/Apr/25JUREFIDREFID:156aeeca716ce806390a |
Date | Wed, 16 Apr 2025 14:13:54 +0000 |
Content-Type | multipart/alternative; boundary="--_NmP-efec200cc4747ec4-Part_1" |
Feedback-ID | ::1.ap-southeast-1.Us16YYR7succb2FX0ao/OkMTR79D6OVjrMpa3mM2Evk=:AmazonSES |
X-SES-Outgoing | 2025.04.16-23.251.232.8 |
Return-Path | 010e01963ef2fe60-81dfddf9-aae8-44c6-a84f-2da8f9b164b0-000000@ap-southeast-1.amazonses.com |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 64ebab8a-ccf4-4b5c-a2d3-2b4e972d96b2:0 |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | SY3PEPF0000A725:EE_|SY8PR01MB9300:EE_|ME2PR01MB3572:EE_ |
X-MS-Office365-Filtering-Correlation-Id | e1db5f1d-75e0-4d22-772e-08dd7cf0ecbe |
X-MS-Exchange-AtpMessageProperties | SA|SL |
X-Microsoft-Antispam | BCL:0;ARA:13230040|12012899012|32142699015|69100299015|5073199012|13003099007|4076899003|8096899003|43540500003; |
X-Forefront-Antispam-Report | CIP:23.251.232.8;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:e232-8.smtp-out.ap-southeast-1.amazonses.com;PTR:e232-8.smtp-out.ap-southeast-1.amazonses.com;CAT:NONE;SFTY:9.25;SFS:(13230040)(12012899012)(32142699015)(69100299015)(5073199012)(13003099007)(4076899003)(8096899003)(43540500003);DIR:INB;SFTY:9.25; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 16 Apr 2025 14:13:55.8629 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | e1db5f1d-75e0-4d22-772e-08dd7cf0ecbe |
X-MS-Exchange-CrossTenant-Id | 64ebab8a-ccf4-4b5c-a2d3-2b4e972d96b2 |
X-MS-Exchange-CrossTenant-AuthSource | SY3PEPF0000A725.ausprd01.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | SY8PR01MB9300 |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:06.7067002 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8632.017 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910005)(944506478)(944626604)(4710137)(4712077)(4999068)(920097)(930097)(140003)(1420198); |
X-Microsoft-Antispam-Message-Info | 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 |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 28, 2025 03:05:45.619761944 CEST | 1.1.1.1 | 192.168.2.8 | 0x23 | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 28, 2025 03:05:45.619761944 CEST | 1.1.1.1 | 192.168.2.8 | 0x23 | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false | ||
Apr 28, 2025 03:05:45.619761944 CEST | 1.1.1.1 | 192.168.2.8 | 0x23 | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:05:41 |
Start date: | 27/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xab0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 21:05:43 |
Start date: | 27/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff74e120000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |