PESCAN.IO - Analysis Report Valid Code |
||||||
File Structure: | ||||||
![]() |
Information: |
Size: 5,36 MB SHA-256 Hash: 0D2145930215E9E276F5AA663FD85C265E38F3FA7A9A103C625075C1E5263C30 SHA-1 Hash: C9087DE746071EE1BE1936F9DD319CE23787A16F MD5 Hash: D25EB868980CCB52E19332385E1A716B Imphash: 9771EE6344923FA220489AB01239BDFD MajorOSVersion: 5 CheckSum: 0054D1C1 EntryPoint (rva): 14AD SizeOfHeaders: 400 SizeOfImage: 54B000 ImageBase: 400000 Architecture: x86 ImportTable: 129C4 Characteristics: 102 TimeDateStamp: 6377E6AC Date: 18/11/2022 20:10:20 File Type: EXE Number Of Sections: 5 ASLR: Enabled Section Names: .text, .rdata, .data, .rsrc, .reloc Number Of Executable Sections: 1 Subsystem: Windows GUI UAC Execution Level Manifest: asInvoker UAC Execution Level Manifest: requireAdministrator |
Sections Info: |
Section Name | Flags | ROffset | RSize | VOffset | VSize |
---|---|---|---|---|---|
.text | 60000020 (Executable) | 400 | B200 | 1000 | B1AF |
.rdata | 40000040 | B600 | 6200 | D000 | 6078 |
.data | C0000040 (Writeable) | 11800 | 800 | 14000 | 11E4 |
.rsrc | 40000040 | 12000 | 533200 | 16000 | 533074 |
.reloc | 42000040 | 545200 | 1000 | 54A000 | EA8 |
Description: |
InternalName: DotNetResolver.exe OriginalFilename: DotNetResolver.exe CompanyName: ScreenConnect Software ProductName: ScreenConnect FileVersion: 0.0.0.0 |
Binder/Joiner/Crypter: |
14 Executable files found Dropper code detected (EOF) - 70,32 KB |
Entry Point: |
The section number (1) - (.text) have the Entry Point Information -> EntryPoint (calculated) - 8AD Code -> E8C5030000E97AFEFFFF558BEC6A00FF1540D04000FF7508FF153CD0400068090400C0FF1544D0400050FF1548D040005DC3 • CALL 0X13CA • JMP 0XE84 • PUSH EBP • MOV EBP, ESP • PUSH 0 • CALL DWORD PTR [0X40D040] • PUSH DWORD PTR [EBP + 8] • CALL DWORD PTR [0X40D03C] • PUSH 0XC0000409 • CALL DWORD PTR [0X40D044] • PUSH EAX • CALL DWORD PTR [0X40D048] • POP EBP • RET |
Signatures: |
CheckSum Integrity Problem: • Header: 5558721 • Calculated: 5646278 Rich Signature Analyzer: Code -> 015F0EE5453E60B6453E60B6453E60B6F1A291B64F3E60B6F1A293B63F3E60B6F1A292B65D3E60B6C54565B7603E60B6C54564B7543E60B6C54563B7513E60B64C46F3B6413E60B65B6CF3B6463E60B6453E61B6253E60B6CB4569B7443E60B6CB459FB6443E60B6CB4562B7443E60B652696368453E60B6 Footprint md5 Hash -> 849DE2AC7EE0A5EA3656A6553164563A • The Rich header apparently has not been modified Certificate - Digital Signature: • The file is signed and the signature is correct |
Packer/Compiler: |
Compiler: Microsoft Visual .NET - (You can use a decompiler for this...) • AnyCPU: False Compiler: Microsoft Visual Studio Compiler: Microsoft Visual C ++ Detect It Easy (die) • PE: compiler: EP:Microsoft Visual C/C++(2017 v.15.5-6)[EXE32] • PE: compiler: Microsoft Visual C/C++(-)[-] • PE: linker: Microsoft Linker(14.33**)[EXE32,admin,signed] • PE: Sign tool: Windows Authenticode(2.0)[PKCS 7] • Entropy: 7.42953 |
Suspicious Functions: |
Library | Function | Description |
---|---|---|
KERNEL32.DLL | GetModuleFileNameA | Retrieve the fully qualified path for the executable file of a specified module. |
KERNEL32.DLL | VirtualAlloc | Reserve, commit, or both, a region of memory within the virtual address space of a process. |
KERNEL32.DLL | GetModuleHandleA | Retrieves a handle to the specified module. |
KERNEL32.DLL | WriteFile | Writes data to a specified file or input/output (I/O) device. |
KERNEL32.DLL | LoadLibraryW | Loads the specified module into the address space of the calling process. |
KERNEL32.DLL | GetModuleHandle | Retrieves a handle to the specified module. |
KERNEL32.DLL | CreateToolhelp32Snapshot | Creates a snapshot of the specified processes, heaps, threads, and modules. |
KERNEL32.DLL | GetProcAddress | Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL). |
KERNEL32.DLL | IsDebuggerPresent | Determines if the calling process is being debugged by a user-mode debugger. |
SHELL32.DLL | ShellExecuteW | Performs a run operation on a specific file. |
Windows REG: |
Software\Microsoft\NET Framework Setup\NDP\v2.0.50727InstallSOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Client[SERVICE_NAME]restartnoneRemote Control"[SERVICE_CLIENT_LAUNCH_PARAMETERS]"{0C94448B-0C9E-4112-AC7D-B00E6BA76D82}0.0.0.0125.0.0.0OLD_PRODUCT_1{1F85D7FE-5576-41EE-9480-E3F7F9C31B8B}OLD_PRODUCT_2OLD_PRODUCT_3NEW_VERSION SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Client[SERVICE_NAME]restartnoneRemote Control"[SERVICE_CLIENT_LAUNCH_PARAMETERS]"{0C94448B-0C9E-4112-AC7D-B00E6BA76D82}0.0.0.0125.0.0.0OLD_PRODUCT_1{1F85D7FE-5576-41EE-9480-E3F7F9C31B8B}OLD_PRODUCT_2OLD_PRODUCT_3NEW_VERSION |
Windows REG (UNICODE): |
SOFTWARE\Microsoft\Cryptography SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Software\Policies\Microsoft\Windows\Installer SYSTEM\CurrentControlSet\Services\ |
File Access: |
DotNetResolver.exe INSTALLLOCATION]ScreenConnect.WindowsClient.exe INSTALLLOCATION]ScreenConnect.WindowsFileManager.exeLaunchApplicationScreenConnect.WindowsClient.exe INSTALLLOCATION]ScreenConnect.WindowsFileManager.exe INSTALLLOCATION]ScreenConnect.WindowsBackstageShell.exe ScreenConnect.WindowsFileManager.exe ScreenConnect.WindowsClient.exe ScreenConnect.WindowsBackstageShell.exe ScreenConnect.ClientInstallerRunner.exe mscoree.dll ScreenConnect.WindowsCredentialProvider.dll ScreenConnect.WindowsAuthenticationPackage.dll SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll24.3.7.90670ScreenConnect.Client.dll5aygg2n-.dll SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll24.3.7.90670ScreenConnect.Client.dll SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll|ScreenConnect.ClientService.dll SchedServiceConfigExecServiceConfigRollbackServiceConfigProgramFilesFolderTBDTARGETDIR.SourceDirFulldbbvsztr.dll 601ScreenConnect.WindowsCredentialProvider.dll 601ScreenConnect.WindowsAuthenticationPackage.dll KERNEL32.dll VERSION.dll ole32.dll SHELL32.dll OLEAUT32.dll USER32.dll ADVAPI32.dll msi.dll wixca.dll failed to get handle to kernel32.dll Microsoft.Deployment.Compression.Cab.dll Microsoft.Deployment.Compression.dll ScreenConnect.Windows.dll ScreenConnect.Core.dll Microsoft.Deployment.WindowsInstaller.Package.dll Microsoft.Deployment.WindowsInstaller.dll ScreenConnect.InstallerActions.dll SfxCA.dll SHLWAPI.dll Cabinet.dll ScreenConnect.WindowsCredentialProvider.dll ScreenConnect.WindowsAuthenticationPackage.dll ScreenConnect.ClientService.dll ScreenConnect.Client.dll ScreenConnect.WindowsInstaller.dll libzstd.dll zlibvc.dll libwebp.dll winmm.dll ScreenConnect.Properties.libz.x86.dll ScreenConnect.Properties.libwebp.x86.dll ScreenConnect.Properties.libzstd.x86.dll ScreenConnect.Properties.libz.x64.dll ScreenConnect.Properties.libwebp.x64.dll ScreenConnect.Properties.libzstd.x64.dll ScreenConnect.Scr ScreenConnect.ScreenConnect.ClientSetup.msi ScreenConnect.UserInterfaceSettingsScreenConnect.Sys .jaR Temp ProgramFiles |
File Access (UNICODE): |
ClientSetup.msi mscoree.dll Core.dll *.dll libwebp.dll CorExitProcessmscoree.dll zlib.dll Windows.dll WindowsInstaller.dll InstallerActions.dll //feedback.scr Failed to locate functions in mscoree.dll CorBindToRuntimeExGetRequestedRuntimeInfoFailed to load mscoree.dll SfxCA.dll d3d9.dll dwmapi.dll rstrtmgr.dll Command failed to execute.Command line returned an error.kernel32.dll wixca.dll ClientInstallerRunner.exe DotNetResolver.exe rundll32.exe msiexec.exe 0\powershell.exe cmd.exe WindowsBackstageShell.exe ClientService.exe WindowsClient.exe Exec - powershell.exe /c Temp AppData |
SQL Queries: |
Select WixCloseApplication, Target, Description, Condition, Attributes, Property, TerminateExitCode, Timeout FROM WixCloseApplication ORDER BY Sequence Select Component_, Directory_, Name, Target, Attributes, IconFile, IconIndex FROM WixInternetShortcutWixSchedInternetShortcutsfailed to initialize WixSchedInternetShortcuts.WixInternetShortcutWixInternetShortcut table doesn't exist, so there are no Internet shortcuts to processfailed to initialize COM Select WixRestartResource.WixRestartResource, WixRestartResource.Component_, WixRestartResource.Resource, WixRestartResource.Attributes FROM WixRestartResourceWixRegisterRestartResourcesWixRestartResource Select WixRemoveFolderEx, Component_, Property, InstallMode FROM WixRemoveFolderEx Select SecureObjects.SecureObject, SecureObjects.Table, SecureObjects.Domain, SecureObjects.User, SecureObjects.Permission, SecureObjects.Component_, Component.Attributes FROM SecureObjects,Component WHERE SecureObjects.Component_=Component.Component Select Registry.Registry, Registry.Root, Registry.Key FROM Registry WHERE Registry.Registry=? Select ServiceInstall.Name FROM ServiceInstall WHERE ServiceInstall.ServiceInstall=? Select ServiceName, Component_, NewService, FirstFailureActionType, SecondFailureActionType, ThirdFailureActionType, ResetPeriodInDays, RestartServiceDelayInSeconds, ProgramCommandLine, RebootMessage FROM ServiceConfig Select Data FROM Binary WHERE Name='%s'Failed to allocate Binary table query.Failed to open view on Binary tableFailed to retrieve request from Binary table Select XmlFile.XmlFile, XmlFile.File, XmlFile.ElementPath, XmlFile.Name, XmlFile.Value, XmlFile.Flags, XmlFile.Component_, Component.Attributes FROM XmlFile,Component WHERE XmlFile.Component_=Component.Component ORDER BY File, SequenceXmlFile.cppfailed to allocate memory for new xml file change list elementXmlFilefailed to open view on XmlFile table Select XmlConfig.XmlConfig, XmlConfig.File, XmlConfig.ElementPath, XmlConfig.VerifyPath, XmlConfig.Name, XmlConfig.Value, XmlConfig.Flags, XmlConfig.Component_, Component.Attributes FROM XmlConfig,Component WHERE XmlConfig.Component_=Component.Component ORDER BY File, Sequencefailed to free xml file element path in change list item Select * FROM %s |
Interest's Words: |
lockbit PADDINGX Encrypt Decrypt Encryption RunPE PassWord <html <head <body <div <form <button <link <title <section <main exec createobject netsh attrib start pause hostname wmic sdelete shutdown systeminfo ping dism expand getmac replace route setx |
Interest's Words (UNICODE): |
Encrypt Encryption PassWord exec powershell netsh attrib start pause wmic sdelete shutdown rundll32 systeminfo ping rundll dism |
URLs: |
http://ocsp.digicert.com http://cacerts.digicert.com/DigiCertTrustedRootG4.crt http://crl3.digicert.com/DigiCertTrustedRootG4.crl http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl http://www.digicert.com/CPS0 http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl |
URLs (UNICODE): |
https://feedback.screenconnect.com/Feedback.axd |
Payloads: |
Unusual BP Cave > 15 Bytes - (0xCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC...) |
PE Carving: |
Start Offset Header | End Offset | Size (Bytes) |
---|---|---|
0 | 123D4 | 123D4 |
123D4 | 983D4 | 86000 |
983D4 | C1DB0 | 299DC |
C1DB0 | 1293B8 | 67608 |
1293B8 | 17E5C0 | 55208 |
17E5C0 | 1933C8 | 14E08 |
1933C8 | 1A57D0 | 12408 |
1A57D0 | 1F71D8 | 51A08 |
1F71D8 | 23C9D4 | 457FC |
23C9D4 | 2575D4 | 1AC00 |
2575D4 | 3F654C | 19EF78 |
3F654C | 50054C | 10A000 |
50054C | 5438EC | 433A0 |
5438EC | 55C948 | 1905C |
Strings/Hex Code Found With The File Rules: |
• Rule Text (Ascii): WinAPI Sockets (bind) • Rule Text (Unicode): WinAPI Sockets (bind) • Rule Text (Ascii): WinAPI Sockets (listen) • Rule Text (Ascii): WinAPI Sockets (accept) • Rule Text (Ascii): WinAPI Sockets (connect) • Rule Text (Unicode): WinAPI Sockets (connect) • Rule Text (Ascii): WinAPI Sockets (send) • Rule Text (Unicode): WinAPI Sockets (send) • Rule Text (Ascii): Registry (RegCreateKeyEx) • Rule Text (Ascii): Registry (RegOpenKeyEx) • Rule Text (Ascii): Registry (RegSetValueEx) • Rule Text (Ascii): File (GetTempPath) • Rule Text (Ascii): File (CopyFile) • Rule Text (Ascii): File (CreateFile) • Rule Text (Ascii): File (WriteFile) • Rule Text (Ascii): File (ReadFile) • Rule Text (Ascii): Service (OpenSCManager) • Rule Text (Ascii): Service (CreateService) • Rule Text (Unicode): Encryption (AesCryptoServiceProvider) • Rule Text (Ascii): Encryption (CreateDecryptor) • Rule Text (Ascii): Encryption (FromBase64String) • Rule Text (Ascii): Encryption (ICryptoTransform) • Rule Text (Ascii): Encryption (MD5CryptoServiceProvider) • Rule Text (Ascii): Encryption (RNGCryptoServiceProvider) • Rule Text (Ascii): Encryption (Rijndael) • Rule Text (Ascii): Encryption (RijndaelManaged) • Rule Text (Ascii): Encryption (ToBase64String) • Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent) • Rule Text (Ascii): Anti-Analysis VM (GetSystemInfo) • Rule Text (Ascii): Anti-Analysis VM (GlobalMemoryStatusEx) • Rule Text (Ascii): Anti-Analysis VM (GetVersion) • Rule Text (Ascii): Anti-Analysis VM (CreateToolhelp32Snapshot) • Rule Text (Ascii): Stealth (VirtualAlloc) • Rule Text (Ascii): Stealth (VirtualProtect) • Rule Text (Ascii): Execution (CreateProcessA) • Rule Text (Ascii): Execution (CreateProcessW) • Rule Text (Ascii): Execution (ShellExecute) • Rule Text (Unicode): Privileges (SeDebugPrivilege) • Rule Text (Unicode): Privileges (SeShutdownPrivilege) • Rule Text (Ascii): Privileges (SE_PRIVILEGE_ENABLED) • Rule Text (Ascii): Privileges (SE_PRIVILEGE_REMOVED) • Rule Text (Ascii): Keyboard Key (ALTDOWN) • Rule Text (Ascii): Keyboard Key (LBUTTON) • Rule Text (Ascii): Keyboard Key (RBUTTON) • Rule Text (Ascii): Keyboard Key (Scroll) • Rule Text (Ascii): Keyboard Key (UpArrow) • Rule Text (Ascii): Malicious code executed after exploiting a vulnerability (Payload) • Rule Text (Ascii): Information used to authenticate a users identity (Credential) • Rule Text (Unicode): Information used to authenticate a users identity (Credential) • Rule Text (Ascii): Process of gathering information about network resources (Enumeration) • Rule Text (Ascii): Malware that monitors and collects user data (Spy) • Rule Text (Ascii): Information used for user authentication (Credential) • Rule Text (Unicode): Information used for user authentication (Credential) • Rule Text (Ascii): Unauthorized movement of funds or data (Transfer) • Rule Text (Unicode): Unauthorized movement of funds or data (Transfer) • Rule Text (Ascii): Malicious rerouting of traffic to an attacker-controlled site (Redirect) • Rule Text (Ascii): Technique used to capture communications between systems (Intercept) • EP Rules: HA Archive • EP Rules: Microsoft Visual C++ 8 • EP Rules: Microsoft Visual C++ 8 • EP Rules: Microsoft Visual C++ v7.0 • EP Rules: PE-Exe Executable Image • EP Rules: Trilobyte's RNR graphics library • EP Rules: VC8 -> Microsoft Corporation |
Resources: |
Path | DataRVA | Size | FileOffset | Code | Text | PE/Payload |
---|---|---|---|---|---|---|
\FILES\SCREENCONNECT.CORE, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 | 163D4 | 86000 | 123D4 | 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000 | MZ......................@......................... | (Executable found) |
\FILES\SCREENCONNECT.WINDOWS, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 | 9C3D4 | 1A4600 | 983D4 | 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000 | MZ......................@......................... | (Executable found) |
\FILES\SCREENCONNECT.WINDOWSINSTALLER, VERSION=24.3.7.9067, CULTURE=NEUTRAL, PUBLICKEYTOKEN=4B14C015C87C1AD8\0 | 2409D4 | 1AC00 | 23C9D4 | 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000 | MZ......................@......................... | (Executable found) |
\FILES\_ENTRYPOINT\0 | 25B5D4 | 2EC318 | 2575D4 | 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000 | MZ......................@......................... | (Executable found) |
\FILES\_RESOLVER\0 | 5478EC | 1600 | 5438EC | 4D5A90000300000004000000FFFF0000B8000000000000004000000000000000000000000000000000000000000000000000 | MZ......................@......................... | (Executable found) |
\24\1\1033 | 548EEC | 188 | 544EEC | 3C3F786D6C2076657273696F6E3D27312E302720656E636F64696E673D275554462D3827207374616E64616C6F6E653D2779 | <?xml version='1.0' encoding='UTF-8' standalone='y |
Intelligent String: |
• 0.0.0.0 • DotNetResolver.exe • :060U00Uq]dL.g?O0U0E1-Q!m0U0y+m0k0$+0http://ocsp.digicert.com0C+07http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0EU>0<0:864http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0U • ScreenConnect.ClientInstallerRunner.exe • _CorExeMainmscoree.dll • KERNEL32.dll • mscoree.dll • \Y4 ScreenConnect.Core.dll • ScreenConnect.Windows.dll • _CorDllMainmscoree.dll • .bss • KERNEL32.DLL • ZLib.DLL • zlib.dll • libwebp.dll • ScreenConnect.Core.dll • *.dll • OLEAUT32.dll • C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb • https://feedback.screenconnect.com/Feedback.axd • .dll • .arm • aShowTrayIconContextMenuStoreLoginCredentialsItem • C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdbs • .avi • runas • cmd.exe • KWindowsPowershell\v1.0\powershell.exe • USER32.DLL • .exe • Default.cab • WScreenConnect.ScreenConnect.ClientSetup.msi • ;ScreenConnect.ClientSetup.msi • msiexec.exe • \YX ScreenConnect.Client.dll • \Y ScreenConnect.ClientService.dll • \Y] ScreenConnect.WindowsBackstageShell.exe • \Yg ScreenConnect.WindowsClient.exe • \Y] ScreenConnect.WindowsFileManager.exe • rundll32.exe • \Microsoft.Deployment.WindowsInstaller.dll • E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb • !"$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]_abcdefghijklmnopqrstuvwxyz{|}~SfxCA.dll • SfxCA.dll • \Y] ScreenConnect.InstallerActions.dll • \YV ScreenConnect.Windows.dll • CloseApps.cpp • Failed to get SID; skipping account %lsosinfo.cpp • d3d9.dll • dwmapi.dll • Unable to schedule rollback for object: %lssecureobj.cpp • serviceconfig.cpp • test.cpp • Global\WixWaitForEventFail • Failed to create the Global\WixWaitForEventFail event. • Global\WixWaitForEventSucceed • Failed to create the Global\WixWaitForEventSucceed event. • XmlConfig.cpp • memutil.cppprocutil.cpp • proc2utl.cpp • fileutil.cpp • aclutil.cpprmutil.cpp • rstrtmgr.dll • pathutil.cpp • xmlutil.cppkernel32.dll • wcalog.cpp • wcascript.cpp • qtexec.cpp • wcawow64.cpp • C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb • ADVAPI32.dll • USER32.dll • wixca.dll • C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb • 8CommandStoreLoginCredentials • AnnotationABlack out the remote monitor so they can't see what you're doing.Blank Guest MonitorGPrevent the user at the remote machine from interfering with your work.Block Guest InputChange ResolutionChange Sharing+Clear everyone's annotations on the screen.Clear AnnotationsJSend your clipboard to the remote machine as keystrokes. Useful for login.Send Clipboard KeystrokesControl Sharing@Enable clipboard help for the Helper to process all copied text.Enable Clipboard Help |
Extra 4n4lysis: |
Metric | Value | Percentage |
---|---|---|
Ascii Code | 3532927 | 62,8401% |
Null Byte Code | 655522 | 11,6598% |
NOP Cave Found | 0x9090909090 | Block Count: 1 | Total: 0% |
© 2025 All rights reserved.