Malicious
Classifications
Spyware
Threat Names
DCRat
Dynamic Analysis Report
Created on 2025-03-28T06:31:25+00:00
rcx8097.exe
Windows Exe (x86-32)
Remarks (2/3)
(0x0200003A): A tasks were rescheduled ahead of time to reveal dormant functionality.
(0x0200000E): The overall sleep time of all monitored processes was truncated from "5 minutes, 10 seconds" to "10 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Boot\da-DK\wininit.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003800 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | 7jWfNSd8AGjRqc4huHFs |
CompanyName | VBWqHKhpTKc7MQXyqF |
InternalName | tctvRTOFbr8EBoCshANGI6Zk.exe |
LegalCopyright | 5UNyiJGCQHm1OEG2E2FVFxYJgktM |
Comments | jiWv0W9AaPU1BxwNxq6HNDETW0L5D |
OriginalFilename | 0g3DaprEYlH1tdcrE9763QoFc.exe |
ProductVersion | 500.188.114.167 |
FileVersion | 664.855.717.154 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x00000410 | 0x00000600 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.11 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AE00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
Memory Dumps (28)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
rcx8097.exe | 1 | 0x00010000 | 0x001B1FFF | Relevant Image |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00970000 | 0x00984FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00900000 | 0x00909FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00990000 | 0x009A0FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00970000 | 0x00984FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x009B0000 | 0x009B0FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AC60000 | 0x1AC69FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x009C0000 | 0x009C1FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x009D0000 | 0x009D5FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x00900000 | 0x00909FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1ADF0000 | 0x1ADF6FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE00000 | 0x1AE04FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE10000 | 0x1AE18FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE00000 | 0x1AE04FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE20000 | 0x1AE21FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE10000 | 0x1AE18FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE00000 | 0x1AE04FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE30000 | 0x1AE31FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE20000 | 0x1AE21FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE10000 | 0x1AE18FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE00000 | 0x1AE04FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE40000 | 0x1AE43FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE30000 | 0x1AE31FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE20000 | 0x1AE21FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE10000 | 0x1AE18FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE00000 | 0x1AE04FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
buffer | 1 | 0x1AE50000 | 0x1AE55FFF | Reflectively Loaded .NET Assembly |
![]() |
64-bit | - |
![]() |
...
|
rcx8097.exe | 1 | 0x00010000 | 0x001B1FFF | Final Dump |
![]() |
64-bit | - |
![]() |
...
|
c:\program files\common files\microsoft shared\vgx\rcx3373.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | eGlu1YNIOMOHcsVGH |
CompanyName | t8VwV9h7RpHRuzgVl9Crk |
InternalName | sJZBW9i6BUUB.exe |
LegalCopyright | 2MBxl04GfB |
Comments | jyrZ3WDg9HWLBUfjZUib7yqvJjOU |
OriginalFilename | bQ7IeU0uHDhQjBLyA9q.exe |
ProductVersion | 451.719.792.845 |
FileVersion | 293.553.371.439 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x000003C4 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.77 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\recovery\windowsre\rcx5e79.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | pE4usJH3QTjhs |
CompanyName | VLm9JEpHScSzIpXdH3wjscOh6 |
InternalName | 3cRn.exe |
LegalCopyright | SKKiwVRZXmecIO2AoyfLb |
Comments | 4Op7KCEK |
OriginalFilename | mrFAo8B6R0rD0J9FqDDVPff2.exe |
ProductVersion | 179.264.559.459 |
FileVersion | 765.3.888.626 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x000003A8 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.76 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\program files (x86)\windows media player\skins\rcx3cec.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | CH58onS |
CompanyName | QgxD3lHC5Q7O8uEbX37 |
InternalName | VG6lHH6tz6sW8.exe |
LegalCopyright | knV6xrsw9IxFOuDHsh03QJ |
Comments | C5vcfS9gsQOmPeqJtv4Gn |
OriginalFilename | C2qqsV5yEeiGSA8k8IArIm9kbhKuW.exe |
ProductVersion | 925.396.720.325 |
FileVersion | 641.190.729.472 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x000003C8 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.73 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\users\oqxzraykm\desktop\rcx2620.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | 9kHn5iZz3IkxGMnxpXxe0oosbI7hU |
CompanyName | hD6CXMfnQtodxEUW5 |
InternalName | 31O.exe |
LegalCopyright | uqJwIuAbpxYUrfbDnsGcGP4NbtQ |
Comments | N4crTcuy26DHbr |
OriginalFilename | bOZsjo1NRxrbQu6fgPpag95BkHS.exe |
ProductVersion | 815.279.286.882 |
FileVersion | 23.238.709.602 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x000003D4 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.7 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\program files (x86)\common files\java\java update\rcx4b29.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | ISOMAeIVU |
CompanyName | UCPXaIQT53Bzmg1GkIG |
InternalName | OnAnwVRUduRlXpWmNk0ZW.exe |
LegalCopyright | juNYeaV3cAPfY |
Comments | Cq6P15jYdTVQSB3A |
OriginalFilename | jUnIraC2k9.exe |
ProductVersion | 619.728.603.429 |
FileVersion | 452.84.426.555 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x0000039C | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.78 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\recovery\windowsre\rcx2ac6.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | X2a2Vkrl07P96SZ2O3QnTY3pQjUxc |
CompanyName | K6Z7PchjO7yMKz1S |
InternalName | pIGlxESj.exe |
LegalCopyright | 8AshWz7VbTp9DfMigTSGNJk7wcdgv |
Comments | 1HQQbgFoavPm6 |
OriginalFilename | zPut3KFc9pcnSfNsG.exe |
ProductVersion | 960.633.333.107 |
FileVersion | 179.879.542.982 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x000003CC | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.73 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\boot\da-dk\rcx472f.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | kglGLvR |
CompanyName | JqKvb |
InternalName | GUmM2ld6KZI7GtMOGEVvwWc.exe |
LegalCopyright | gNZ |
Comments | uxVpTp7pPkAfaxrT7Nhb |
OriginalFilename | 4TFwBUxovogS7qqEpfuid9ZElLj2.exe |
ProductVersion | 69.899.894.353 |
FileVersion | 121.358.52.902 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x00000398 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.79 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\users\default\rcx6b0d.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | BdSCOTC |
CompanyName | pWVTJEFp1z8BmpL0 |
InternalName | 5TDCeFd.exe |
LegalCopyright | 0mukDM |
Comments | BnhRRp4LmYdePTXeqemT99t |
OriginalFilename | QzKTO.exe |
ProductVersion | 481.185.231.329 |
FileVersion | 72.249.923.973 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x0000036C | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.83 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\windows\schcache\rcx4f23.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | xsoqzR44DMST9cloTaWpm3W |
CompanyName | 68dV1a |
InternalName | wOHP.exe |
LegalCopyright | I3E0oj9jYjlAo3qprN61O |
Comments | txhpDeF1E2uBq |
OriginalFilename | yuAJ4jcQQdv7J.exe |
ProductVersion | 747.167.849.794 |
FileVersion | 715.767.274.460 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x0000038C | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.82 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\recovery\windowsre\rcx5724.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | L9fuaismtue |
CompanyName | E7 |
InternalName | v6ofOtC.exe |
LegalCopyright | FSp3DkHpkALUBuXFNgqIPtIe |
Comments | bY |
OriginalFilename | 4GKmIMiOBgiIW7.exe |
ProductVersion | 389.456.732.403 |
FileVersion | 522.962.12.176 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x00000368 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.82 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
c:\program files (x86)\windowspowershell\rcx3847.tmp | Dropped File | Binary |
Clean
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x005993EE |
Size Of Code | 0x00197400 |
Size Of Initialized Data | 0x00003600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2022-07-24 15:13 (UTC) |
Version Information (8)
»
ProductName | kQMH |
CompanyName | AM0ZDp9bKSR2uRrPQIjbPr |
InternalName | t13eKcn10i.exe |
LegalCopyright | hmUG7ZwR9MtNlljm |
Comments | IyUti3WiJHnBV |
OriginalFilename | wU9sg4KKRW7rG9.exe |
ProductVersion | 97.234.999.173 |
FileVersion | 80.162.494.778 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x001973F4 | 0x00197400 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.35 |
.sdata | 0x0059A000 | 0x00002FDF | 0x00003000 | 0x00197800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.24 |
.rsrc | 0x0059E000 | 0x00000390 | 0x00000400 | 0x0019A800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.76 |
.reloc | 0x005A0000 | 0x0000000C | 0x00000200 | 0x0019AC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x001993C8 | 0x001977C8 | 0x00000000 |
C:\Program Files\Common Files\microsoft shared\VGX\926e3e4b62361b | Dropped File | Text |
Clean
|
...
|
»
C:\Program Files (x86)\WindowsPowerShell\7a0fd90576e088 | Dropped File | Text |
Clean
|
...
|
»
C:\Recovery\WindowsRE\f8c8f1285d826b | Dropped File | Text |
Clean
|
...
|
»
C:\Program Files (x86)\Common Files\Java\Java Update\e722b01d8d060f | Dropped File | Text |
Clean
|
...
|
»
C:\Recovery\WindowsRE\fcfd578d3ffeb2 | Dropped File | Text |
Clean
|
...
|
»
C:\Program Files (x86)\Windows Media Player\Skins\dea609c9470f15 | Dropped File | Text |
Clean
|
...
|
»
C:\Recovery\WindowsRE\55b276f4edf653 | Dropped File | Text |
Clean
|
...
|
»
025fc246f13759c192cbbae2a68f2b59b6478f21b31a05d77483a87e417906dd | Extracted File | Image |
Clean
Known to be clean.
|
»
File Reputation Information
»
Verdict |
Clean
Known to be clean.
|