PESCAN.IO - Analysis Report Valid Code

File Structure:
Analysis Image
Information:
Size: 5,36 MB
SHA-256 Hash: 0D2145930215E9E276F5AA663FD85C265E38F3FA7A9A103C625075C1E5263C30
SHA-1 Hash: C9087DE746071EE1BE1936F9DD319CE23787A16F
MD5 Hash: D25EB868980CCB52E19332385E1A716B
Imphash: 9771EE6344923FA220489AB01239BDFD
MajorOSVersion: 5
CheckSum: 0054D1C1
EntryPoint (rva): 14AD
SizeOfHeaders: 400
SizeOfImage: 54B000
ImageBase: 400000
Architecture: x86
ImportTable: 129C4
Characteristics: 102
TimeDateStamp: 6377E6AC
Date: 18/11/2022 20:10:20
File Type: EXE
Number Of Sections: 5
ASLR: Enabled
Section Names: .text, .rdata, .data, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI
UAC Execution Level Manifest: asInvoker
UAC Execution Level Manifest: requireAdministrator

Sections Info:
Section Name Flags ROffset RSize VOffset VSize
.text 60000020 (Executable) 400 B200 1000 B1AF
.rdata 40000040 B600 6200 D000 6078
.data C0000040 (Writeable) 11800 800 14000 11E4
.rsrc 40000040 12000 533200 16000 533074
.reloc 42000040 545200 1000 54A000 EA8
Description:
InternalName: DotNetResolver.exe
OriginalFilename: DotNetResolver.exe
CompanyName: ScreenConnect Software
ProductName: ScreenConnect
FileVersion: 0.0.0.0

Binder/Joiner/Crypter:
14 Executable files found
Dropper code detected (EOF) - 70,32 KB

Entry Point:
The section number (1) - (.text) have the Entry Point
Information -> EntryPoint (calculated) - 8AD
Code -> E8C5030000E97AFEFFFF558BEC6A00FF1540D04000FF7508FF153CD0400068090400C0FF1544D0400050FF1548D040005DC3
CALL 0X13CA
JMP 0XE84
PUSH EBP
MOV EBP, ESP
PUSH 0
CALL DWORD PTR [0X40D040]
PUSH DWORD PTR [EBP + 8]
CALL DWORD PTR [0X40D03C]
PUSH 0XC0000409
CALL DWORD PTR [0X40D044]
PUSH EAX
CALL DWORD PTR [0X40D048]
POP EBP
RET

Signatures:
CheckSum Integrity Problem:
Header: 5558721
Calculated: 5646278
Rich Signature Analyzer:
Code -> 015F0EE5453E60B6453E60B6453E60B6F1A291B64F3E60B6F1A293B63F3E60B6F1A292B65D3E60B6C54565B7603E60B6C54564B7543E60B6C54563B7513E60B64C46F3B6413E60B65B6CF3B6463E60B6453E61B6253E60B6CB4569B7443E60B6CB459FB6443E60B6CB4562B7443E60B652696368453E60B6
Footprint md5 Hash -> 849DE2AC7EE0A5EA3656A6553164563A
• The Rich header apparently has not been modified
Certificate - Digital Signature:
• The file is signed and the signature is correct

Packer/Compiler:
Compiler: Microsoft Visual .NET - (You can use a decompiler for this...)
AnyCPU: False
Compiler: Microsoft Visual Studio
Compiler: Microsoft Visual C ++
Detect It Easy (die)
PE: compiler: EP:Microsoft Visual C/C++(2017 v.15.5-6)[EXE32]
PE: compiler: Microsoft Visual C/C++(-)[-]
PE: linker: Microsoft Linker(14.33**)[EXE32,admin,signed]
PE: Sign tool: Windows Authenticode(2.0)[PKCS 7]
Entropy: 7.42953

Suspicious Functions:
Library Function Description
KERNEL32.DLL GetModuleFileNameA Retrieve the fully qualified path for the executable file of a specified module.
KERNEL32.DLL VirtualAlloc Reserve, commit, or both, a region of memory within the virtual address space of a process.
KERNEL32.DLL GetModuleHandleA Retrieves a handle to the specified module.
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL LoadLibraryW Loads the specified module into the address space of the calling process.
KERNEL32.DLL GetModuleHandle Retrieves a handle to the specified module.
KERNEL32.DLL CreateToolhelp32Snapshot Creates a snapshot of the specified processes, heaps, threads, and modules.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL IsDebuggerPresent Determines if the calling process is being debugged by a user-mode debugger.
SHELL32.DLL ShellExecuteW Performs a run operation on a specific file.
Windows REG:
Software\Microsoft\NET Framework Setup\NDP\v2.0.50727InstallSOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Client[SERVICE_NAME]restartnoneRemote Control"[SERVICE_CLIENT_LAUNCH_PARAMETERS]"{0C94448B-0C9E-4112-AC7D-B00E6BA76D82}0.0.0.0125.0.0.0OLD_PRODUCT_1{1F85D7FE-5576-41EE-9480-E3F7F9C31B8B}OLD_PRODUCT_2OLD_PRODUCT_3NEW_VERSION
SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Client[SERVICE_NAME]restartnoneRemote Control"[SERVICE_CLIENT_LAUNCH_PARAMETERS]"{0C94448B-0C9E-4112-AC7D-B00E6BA76D82}0.0.0.0125.0.0.0OLD_PRODUCT_1{1F85D7FE-5576-41EE-9480-E3F7F9C31B8B}OLD_PRODUCT_2OLD_PRODUCT_3NEW_VERSION

Windows REG (UNICODE):
SOFTWARE\Microsoft\Cryptography
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Software\Policies\Microsoft\Windows\Installer
SYSTEM\CurrentControlSet\Services\

File Access:
DotNetResolver.exe
INSTALLLOCATION]ScreenConnect.WindowsClient.exe
INSTALLLOCATION]ScreenConnect.WindowsFileManager.exeLaunchApplicationScreenConnect.WindowsClient.exe
INSTALLLOCATION]ScreenConnect.WindowsFileManager.exe
INSTALLLOCATION]ScreenConnect.WindowsBackstageShell.exe
ScreenConnect.WindowsFileManager.exe
ScreenConnect.WindowsClient.exe
ScreenConnect.WindowsBackstageShell.exe
ScreenConnect.ClientInstallerRunner.exe
mscoree.dll
ScreenConnect.WindowsCredentialProvider.dll
ScreenConnect.WindowsAuthenticationPackage.dll
SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll24.3.7.90670ScreenConnect.Client.dll5aygg2n-.dll
SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll24.3.7.90670ScreenConnect.Client.dll
SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll
SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll
601ScreenConnect.WindowsCredentialProvider.dll
601ScreenConnect.WindowsAuthenticationPackage.dll
KERNEL32.dll
VERSION.dll
ole32.dll
SHELL32.dll
OLEAUT32.dll
USER32.dll
ADVAPI32.dll
msi.dll
wixca.dll
failed to get handle to kernel32.dll
Microsoft.Deployment.Compression.Cab.dll
Microsoft.Deployment.Compression.dll
ScreenConnect.Windows.dll
ScreenConnect.Core.dll
Microsoft.Deployment.WindowsInstaller.Package.dll
Microsoft.Deployment.WindowsInstaller.dll
ScreenConnect.InstallerActions.dll
SfxCA.dll
SHLWAPI.dll
Cabinet.dll
ScreenConnect.WindowsCredentialProvider.dll
ScreenConnect.WindowsAuthenticationPackage.dll
ScreenConnect.ClientService.dll
ScreenConnect.Client.dll
ScreenConnect.WindowsInstaller.dll
libzstd.dll
zlibvc.dll
libwebp.dll
winmm.dll
ScreenConnect.Properties.libz.x86.dll
ScreenConnect.Properties.libwebp.x86.dll
ScreenConnect.Properties.libzstd.x86.dll
ScreenConnect.Properties.libz.x64.dll
ScreenConnect.Properties.libwebp.x64.dll
ScreenConnect.Properties.libzstd.x64.dll
ScreenConnect.Scr
ScreenConnect.ScreenConnect.ClientSetup.msi
ScreenConnect.UserInterfaceSettingsScreenConnect.Sys
.jaR
Temp
ProgramFiles

File Access (UNICODE):
ClientSetup.msi
mscoree.dll
Core.dll
*.dll
libwebp.dll
CorExitProcessmscoree.dll
zlib.dll
Windows.dll
WindowsInstaller.dll
InstallerActions.dll
//feedback.scr
Failed to locate functions in mscoree.dll
CorBindToRuntimeExGetRequestedRuntimeInfoFailed to load mscoree.dll
SfxCA.dll
d3d9.dll
dwmapi.dll
rstrtmgr.dll
Command failed to execute.Command line returned an error.kernel32.dll
wixca.dll
ClientInstallerRunner.exe
DotNetResolver.exe
rundll32.exe
msiexec.exe
0\powershell.exe
cmd.exe
WindowsBackstageShell.exe
ClientService.exe
WindowsClient.exe
Exec - powershell.exe /c
Temp
AppData

SQL Queries:
Select WixCloseApplication, Target, Description, Condition, Attributes, Property, TerminateExitCode, Timeout FROM WixCloseApplication ORDER BY Sequence
Select Component_, Directory_, Name, Target, Attributes, IconFile, IconIndex FROM WixInternetShortcutWixSchedInternetShortcutsfailed to initialize WixSchedInternetShortcuts.WixInternetShortcutWixInternetShortcut table doesn't exist, so there are no Internet shortcuts to processfailed to initialize COM
Select WixRestartResource.WixRestartResource, WixRestartResource.Component_, WixRestartResource.Resource, WixRestartResource.Attributes FROM WixRestartResourceWixRegisterRestartResourcesWixRestartResource
Select WixRemoveFolderEx, Component_, Property, InstallMode FROM WixRemoveFolderEx
Select SecureObjects.SecureObject, SecureObjects.Table, SecureObjects.Domain, SecureObjects.User, SecureObjects.Permission, SecureObjects.Component_, Component.Attributes FROM SecureObjects,Component WHERE SecureObjects.Component_=Component.Component
Select Registry.Registry, Registry.Root, Registry.Key FROM Registry WHERE Registry.Registry=?
Select ServiceInstall.Name FROM ServiceInstall WHERE ServiceInstall.ServiceInstall=?
Select ServiceName, Component_, NewService, FirstFailureActionType, SecondFailureActionType, ThirdFailureActionType, ResetPeriodInDays, RestartServiceDelayInSeconds, ProgramCommandLine, RebootMessage FROM ServiceConfig
Select Data FROM Binary WHERE Name='%s'Failed to allocate Binary table query.Failed to open view on Binary tableFailed to retrieve request from Binary table
Select XmlFile.XmlFile, XmlFile.File, XmlFile.ElementPath, XmlFile.Name, XmlFile.Value, XmlFile.Flags, XmlFile.Component_, Component.Attributes FROM XmlFile,Component WHERE XmlFile.Component_=Component.Component ORDER BY File, SequenceXmlFile.cppfailed to allocate memory for new xml file change list elementXmlFilefailed to open view on XmlFile table
Select XmlConfig.XmlConfig, XmlConfig.File, XmlConfig.ElementPath, XmlConfig.VerifyPath, XmlConfig.Name, XmlConfig.Value, XmlConfig.Flags, XmlConfig.Component_, Component.Attributes FROM XmlConfig,Component WHERE XmlConfig.Component_=Component.Component ORDER BY File, Sequencefailed to free xml file element path in change list item
Select * FROM %s

Interest's Words:
lockbit
PADDINGX
Encrypt
Decrypt
Encryption
RunPE
PassWord
<html
<head
<body
<div
<form
<button
<link
<title
<section
<main
exec
createobject
netsh
attrib
start
pause
hostname
wmic
sdelete
shutdown
systeminfo
ping
dism
expand
getmac
replace
route
setx

Interest's Words (UNICODE):
Encrypt
Encryption
PassWord
exec
powershell
netsh
attrib
start
pause
wmic
sdelete
shutdown
rundll32
systeminfo
ping
rundll
dism

URLs:
http://ocsp.digicert.com
http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
http://crl3.digicert.com/DigiCertTrustedRootG4.crl
http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl
http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl
http://www.digicert.com/CPS0
http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt
http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl
http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt
http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt
http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl

URLs (UNICODE):
https://feedback.screenconnect.com/Feedback.axd

Payloads:
Unusual BP Cave > 15 Bytes - (0xCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC...)

PE Carving:
Start Offset Header End Offset Size (Bytes)
0 123D4 123D4
123D4 983D4 86000
983D4 C1DB0 299DC
C1DB0 1293B8 67608
1293B8 17E5C0 55208
17E5C0 1933C8 14E08
1933C8 1A57D0 12408
1A57D0 1F71D8 51A08
1F71D8 23C9D4 457FC
23C9D4 2575D4 1AC00
2575D4 3F654C 19EF78
3F654C 50054C 10A000
50054C 5438EC 433A0
5438EC 55C948 1905C
Strings/Hex Code Found With The File Rules:
Rule Text (Ascii): WinAPI Sockets (bind)
Rule Text (Unicode): WinAPI Sockets (bind)
Rule Text (Ascii): WinAPI Sockets (listen)
Rule Text (Ascii): WinAPI Sockets (accept)
Rule Text (Ascii): WinAPI Sockets (connect)
Rule Text (Unicode): WinAPI Sockets (connect)
Rule Text (Ascii): WinAPI Sockets (send)
Rule Text (Unicode): WinAPI Sockets (send)
Rule Text (Ascii): Registry (RegCreateKeyEx)
Rule Text (Ascii): Registry (RegOpenKeyEx)
Rule Text (Ascii): Registry (RegSetValueEx)
Rule Text (Ascii): File (GetTempPath)
Rule Text (Ascii): File (CopyFile)
Rule Text (Ascii): File (CreateFile)
Rule Text (Ascii): File (WriteFile)
Rule Text (Ascii): File (ReadFile)
Rule Text (Ascii): Service (OpenSCManager)
Rule Text (Ascii): Service (CreateService)
Rule Text (Unicode): Encryption (AesCryptoServiceProvider)
Rule Text (Ascii): Encryption (CreateDecryptor)
Rule Text (Ascii): Encryption (FromBase64String)
Rule Text (Ascii): Encryption (ICryptoTransform)
Rule Text (Ascii): Encryption (MD5CryptoServiceProvider)
Rule Text (Ascii): Encryption (RNGCryptoServiceProvider)
Rule Text (Ascii): Encryption (Rijndael)
Rule Text (Ascii): Encryption (RijndaelManaged)
Rule Text (Ascii): Encryption (ToBase64String)
Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent)
Rule Text (Ascii): Anti-Analysis VM (GetSystemInfo)
Rule Text (Ascii): Anti-Analysis VM (GlobalMemoryStatusEx)
Rule Text (Ascii): Anti-Analysis VM (GetVersion)
Rule Text (Ascii): Anti-Analysis VM (CreateToolhelp32Snapshot)
Rule Text (Ascii): Stealth (VirtualAlloc)
Rule Text (Ascii): Stealth (VirtualProtect)
Rule Text (Ascii): Execution (CreateProcessA)
Rule Text (Ascii): Execution (CreateProcessW)
Rule Text (Ascii): Execution (ShellExecute)
Rule Text (Unicode): Privileges (SeDebugPrivilege)
Rule Text (Unicode): Privileges (SeShutdownPrivilege)
Rule Text (Ascii): Privileges (SE_PRIVILEGE_ENABLED)
Rule Text (Ascii): Privileges (SE_PRIVILEGE_REMOVED)
Rule Text (Ascii): Keyboard Key (ALTDOWN)
Rule Text (Ascii): Keyboard Key (LBUTTON)
Rule Text (Ascii): Keyboard Key (RBUTTON)
Rule Text (Ascii): Keyboard Key (Scroll)
Rule Text (Ascii): Keyboard Key (UpArrow)
Rule Text (Ascii): Malicious code executed after exploiting a vulnerability (Payload)
Rule Text (Ascii): Information used to authenticate a users identity (Credential)
Rule Text (Unicode): Information used to authenticate a users identity (Credential)
Rule Text (Ascii): Process of gathering information about network resources (Enumeration)
Rule Text (Ascii): Malware that monitors and collects user data (Spy)
Rule Text (Ascii): Information used for user authentication (Credential)
Rule Text (Unicode): Information used for user authentication (Credential)
Rule Text (Ascii): Unauthorized movement of funds or data (Transfer)
Rule Text (Unicode): Unauthorized movement of funds or data (Transfer)
Rule Text (Ascii): Malicious rerouting of traffic to an attacker-controlled site (Redirect)
Rule Text (Ascii): Technique used to capture communications between systems (Intercept)
EP Rules: HA Archive
EP Rules: Microsoft Visual C++ 8
EP Rules: Microsoft Visual C++ 8
EP Rules: Microsoft Visual C++ v7.0
EP Rules: PE-Exe Executable Image
EP Rules: Trilobyte's RNR graphics library
EP Rules: VC8 -> Microsoft Corporation

Resources:
Path DataRVA Size FileOffset CodeTextPE/Payload
\FILES\SCREENCONNECT.CORE, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 163D4 86000 123D4 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000MZ......................@.........................(Executable found)
\FILES\SCREENCONNECT.WINDOWS, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 9C3D4 1A4600 983D4 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000MZ......................@.........................(Executable found)
\FILES\SCREENCONNECT.WINDOWSINSTALLER, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 2409D4 1AC00 23C9D4 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000MZ......................@.........................(Executable found)
\FILES\_ENTRYPOINT\0 25B5D4 2EC318 2575D4 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000MZ......................@.........................(Executable found)
\FILES\_RESOLVER\0 5478EC 1600 5438EC 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000MZ......................@.........................(Executable found)
\24\1\1033 548EEC 188 544EEC 3C3F786D6C2076657273696F6E3D27312E302720656E636F64696E673D275554462D3827207374616E64616C6F6E653D2779<?xml version='1.0' encoding='UTF-8' standalone='y
Intelligent String:
• 0.0.0.0
• DotNetResolver.exe
• :060U00Uq]dL.g?O0U0E1-Q!m0U0y+m0k0$+0http://ocsp.digicert.com0C+07http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0EU>0<0:864http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0U
• ScreenConnect.ClientInstallerRunner.exe
• _CorExeMainmscoree.dll
• KERNEL32.dll
• mscoree.dll
• \Y4 ScreenConnect.Core.dll
• ScreenConnect.Windows.dll
• _CorDllMainmscoree.dll
• .bss
• KERNEL32.DLL
• ZLib.DLL
• zlib.dll
• libwebp.dll
• ScreenConnect.Core.dll
• *.dll
• OLEAUT32.dll
• C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb
• https://feedback.screenconnect.com/Feedback.axd
• .dll
• .arm
• aShowTrayIconContextMenuStoreLoginCredentialsItem
• C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdbs
• .avi
• runas
• cmd.exe
• KWindowsPowershell\v1.0\powershell.exe
• USER32.DLL
• .exe
• Default.cab
• WScreenConnect.ScreenConnect.ClientSetup.msi
• ;ScreenConnect.ClientSetup.msi
• msiexec.exe
• \YX ScreenConnect.Client.dll
• \Y ScreenConnect.ClientService.dll
• \Y] ScreenConnect.WindowsBackstageShell.exe
• \Yg ScreenConnect.WindowsClient.exe
• \Y] ScreenConnect.WindowsFileManager.exe
• rundll32.exe
• \Microsoft.Deployment.WindowsInstaller.dll
• E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb
• !"$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]_abcdefghijklmnopqrstuvwxyz{|}~SfxCA.dll
• SfxCA.dll
• \Y] ScreenConnect.InstallerActions.dll
• \YV ScreenConnect.Windows.dll
• CloseApps.cpp
• Failed to get SID; skipping account %lsosinfo.cpp
• d3d9.dll
• dwmapi.dll
• Unable to schedule rollback for object: %lssecureobj.cpp
• serviceconfig.cpp
• test.cpp
• Global\WixWaitForEventFail
• Failed to create the Global\WixWaitForEventFail event.
• Global\WixWaitForEventSucceed
• Failed to create the Global\WixWaitForEventSucceed event.
• XmlConfig.cpp
• memutil.cppprocutil.cpp
• proc2utl.cpp
• fileutil.cpp
• aclutil.cpprmutil.cpp
• rstrtmgr.dll
• pathutil.cpp
• xmlutil.cppkernel32.dll
• wcalog.cpp
• wcascript.cpp
• qtexec.cpp
• wcawow64.cpp
• C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb
• ADVAPI32.dll
• USER32.dll
• wixca.dll
• C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb
• 8CommandStoreLoginCredentials
• AnnotationABlack out the remote monitor so they can't see what you're doing.Blank Guest MonitorGPrevent the user at the remote machine from interfering with your work.Block Guest InputChange ResolutionChange Sharing+Clear everyone's annotations on the screen.Clear AnnotationsJSend your clipboard to the remote machine as keystrokes. Useful for login.Send Clipboard KeystrokesControl Sharing@Enable clipboard help for the Helper to process all copied text.Enable Clipboard Help

Extra 4n4lysis:
Metric Value Percentage
Ascii Code 3532927 62,8401%
Null Byte Code 655522 11,6598%
NOP Cave Found 0x9090909090 Block Count: 1 | Total: 0%
© 2025 All rights reserved.