Unfortunately, if you have viruses, keylogger and collector of information like file enumeration, debugging, application permissions, encryptions, obfuscators, etc. It also has a rest time of 30 seconds to 3 minutes. It is something subtle, not so invasive, but it is malicious, I am not an expert, but it looks like Ransomware; However, the tool does work, although it also collects the results. IT IS VERY IMPORTANT TO USE IT IN VIRTUAL ENVIRONMENTS.