An analyst is performing static analysis on a suspected malicious executable. Which of the following activities would they most likely perform during this phase?
-
A
Running the executable in a sandboxed environment to monitor network traffic.
-
B
Executing the file and observing which processes it launches.
-
C
Examining the Portable Executable (PE) header to identify imported DLLs and functions.
-
D
Setting breakpoints in a debugger to step through the code's execution flow.