Malicious
Classifications
-
Threat Names
Mal/Generic-S
Dynamic Analysis Report
Created on 2022-04-25T13:01:00
458ad7362cfb6980b9e7eb19ab83ddc6d261bf6b057f1892267dd55c656e9686.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\458ad7362cfb6980b9e7eb19ab83ddc6d261bf6b057f1892267dd55c656e9686.exe | Sample File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40732e |
Size Of Code | 0x5400 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-01-24 15:10:07+00:00 |
Version Information (11)
»
Comments | - |
CompanyName | - |
FileDescription | crss |
FileVersion | 1.0.0.0 |
InternalName | crsss.exe |
LegalCopyright | Copyright © Microsoft |
LegalTrademarks | - |
OriginalFilename | crsss.exe |
ProductName | crss |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x5334 | 0x5400 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.25 |
.rsrc | 0x408000 | 0x598 | 0x600 | 0x5600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.99 |
.reloc | 0x40a000 | 0xc | 0x200 | 0x5c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x402000 | 0x7304 | 0x5504 | 0x0 |
Memory Dumps (3)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
458ad7362cfb6980b9e7eb19ab83ddc6d261bf6b057f1892267dd55c656e9686.exe | 1 | 0x00400000 | 0x0040BFFF | Relevant Image |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1A65D000 | 0x1A65FFFF | First Network Behavior |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00145000 | 0x0014FFFF | First Network Behavior |
![]() |
64-bit | - |
![]() |
...
|
C:\HOW TO RECOVER ENCRYPTED FILES.txt | Dropped File | Text |
clean
|
...
|
»