$binai analyze --target crackme_v3.exe --tier pro
› reading PE32+ headers .................. ok (4.2 MB)
› entropy scan ............................ 7.94 (compressed)
› signature match ......................... 12 hits
PACKER DETECTED: VMProtect 3.x + UPX Layer
ANTI-DEBUG: IsDebuggerPresent, NtQueryInformationProcess
› unpacking via CPU emulation ............. 1.41s
› LLM decompiler engaged .................. claude-opus-4.6
› reconstructing symbols .................. 312 fns named
AUTH SYSTEM: Online license validation → api.license.io/v2/verify
HWID FINGERPRINT: MAC address + Volume Serial + CPUID hash
CRYPTO: AES-256-CBC + RSA-2048 key exchange
› generating YARA rules ................... 7 patterns
› writing pdf report ...................... report_2c4f.pdf
$