Create Interactive Tour

Windows Analysis Report PcaSvc.dll

Overview

General Information

Sample Name:PcaSvc.dll
Analysis ID:497676
MD5:c01a9d3e01e0519140f9e2b266bbf4a0
SHA1:478b1f1fb8be008b22ac8034714ca717544c6f67
SHA256:156a0e4d76e24922dda8ecb2d80a7754d1627246d9dd66dddbe46304fec3f472
Infos:

Most interesting Screenshot:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Checks if the current process is being debugged
PE file contains sections with non-standard names
Binary contains a suspicious time stamp

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 4424 cmdline: loaddll64.exe 'C:\Users\user\Desktop\PcaSvc.dll' MD5: E0CC9D126C39A9D2FA1CAD5027EBBD18)
    • cmd.exe (PID: 6020 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 3640 cmdline: rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5824 cmdline: rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,PcaPatchSdbTask MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7016 cmdline: rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettings MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4780 cmdline: rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettingsTC MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: PcaSvc.dllStatic PE information: certificate valid
Source: PcaSvc.dllStatic PE information: GUARD_CF, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: pcasvc.pdb source: PcaSvc.dll
Source: Binary string: pcasvc.pdbUGP source: PcaSvc.dll
Source: PcaSvc.dllBinary or memory string: 0aTelemetryPermission-AllowDisableTelemetryPermission-DefaultLevelKernel-ProductInfoPRINTERRORMARKSimpleMetricMessageActivitys-1-5-18s-1-5-19s-1-5-20%system32%%systemroot%\system32%sysnative%%programfilesnative%%systemdrive%\Program FilesCommonFilesDirCommonProgramFilesCommonFilesDir (x86)CommonProgramFiles(x86)ProgramFilesDirProgramFilesProgramFilesDir (x86)ProgramFiles(x86)ProgramDataPublicOriginalFilename vs PcaSvc.dll
Source: PcaSvc.dllBinary or memory string: NameOsComponentSizeMagicPeHeaderHashSizeOfImagePeChecksumLinkDateLinkerVersionBinFileVersionBinProductVersionBinaryTypeCreatedModifiedLastAccessedVerLanguageIdSwitchBackContextSigDisplayNameSigFriendlyPublisherNameSigMoreInfoURLOriginalFileNamePeImageTypePeSubsystemRunLevelUiAccessCrcChecksumClrVersionBoeProgramIdBoeProgramNameBoeProgramPublisherBoeProgramVersionBoeProgramLanguageSigPublisherNameFileSizekernelbase.dllRaiseFailFastException%wsstd::exception: %hsRtlNtStatusToDosErrorNoTebRtlDllShutdownInProgressCrashInstallFailedChainFirstRunUninstallFailedQuarantinedAppRunPinDLLFileTracerCreateFileMSILaunchBlockedMobileBroadbandInstallerO vs PcaSvc.dll
Source: C:\Windows\System32\loaddll64.exeSection loaded: apisampling.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: tdh.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
Source: PcaSvc.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PcaSvc.dllBinary string: %sMarkEventFailed to create store [%d]PcaChainDataBuilderExecuteIgnoreFreeLibrary FaultTolerantHeap DWM8And16BitMitigation ElevateCreateProcessPcaSvcTracePcaSvcDebugFailed to execute resolvers [%d]ResolverManager_ChainCompleteFailed to read NoisyResolvers [%d]ResolverManagerp_ExecuteResolversDisablePcaUISoftware\Policies\Microsoft\Windows\AppCompat%s\Temp\AslLog_%S_%s_%d.txt\Device\InstallShield\setup.exesetup16.execsrstub.exeERROR#%s#%d?
Source: classification engineClassification label: clean3.winDLL@11/0@0/0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,PcaPatchSdbTask
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\PcaSvc.dll'
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,PcaPatchSdbTask
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettings
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettingsTC
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,PcaPatchSdbTaskJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettingsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettingsTCJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: PcaSvc.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: PcaSvc.dllStatic PE information: certificate valid
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PcaSvc.dllStatic PE information: GUARD_CF, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: PcaSvc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: pcasvc.pdb source: PcaSvc.dll
Source: Binary string: pcasvc.pdbUGP source: PcaSvc.dll
Source: PcaSvc.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PcaSvc.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PcaSvc.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PcaSvc.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PcaSvc.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: PcaSvc.dllStatic PE information: section name: .didat
Source: PcaSvc.dllStatic PE information: 0x8226DCB8 [Sat Mar 12 23:22:32 2039 UTC]
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1Jump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection11Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Rundll321LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Timestomp1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 497676 Sample: PcaSvc.dll Startdate: 06/10/2021 Architecture: WINDOWS Score: 3 6 loaddll64.exe 1 2->6         started        process3 8 cmd.exe 1 6->8         started        10 rundll32.exe 6->10         started        12 rundll32.exe 6->12         started        14 rundll32.exe 6->14         started        process4 16 rundll32.exe 8->16         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
PcaSvc.dll0%VirustotalBrowse
PcaSvc.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:497676
Start date:06.10.2021
Start time:08:02:40
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 33s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:PcaSvc.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:27
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean3.winDLL@11/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .dll
  • Override analysis time to 240s for rundll32
Warnings:
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 20.50.102.62, 2.20.178.24, 2.20.178.33, 20.54.110.249, 40.112.88.60, 2.20.178.10, 2.20.178.56, 20.199.120.182, 20.199.120.85, 20.199.120.151
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found

Static File Info

General

File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Entropy (8bit):6.343812707574443
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:PcaSvc.dll
File size:876344
MD5:c01a9d3e01e0519140f9e2b266bbf4a0
SHA1:478b1f1fb8be008b22ac8034714ca717544c6f67
SHA256:156a0e4d76e24922dda8ecb2d80a7754d1627246d9dd66dddbe46304fec3f472
SHA512:5c59aa2a76189c654ce1acff067cb9df44d56974d617eff954f9b6f68a385dfb4c54f31c4e8e38264d73ae272886c3e53c1a2e70b905dcef3d86323c7cc50ff2
SSDEEP:24576:GIdDBe0fbgZw/9FuKw4rsNkEQTHwzm+Zq2queGie:GI3e0fcqeLNkEEYPq2qu/
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.. ...s...s...s..ss...s...r...s...r...s...s^..s...r...s...r...s...r...s...r...s...s...s...r...sRich...s................PE..d..

File Icon

Icon Hash:74f0e4ecccdce0e4

General

Entrypoint:0x1800165b0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x180000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
DLL Characteristics:GUARD_CF, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0x8226DCB8 [Sat Mar 12 23:22:32 2039 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:5bb5a2e1975ae78207abb2b6f6ef800f
Signature Valid:true
Signature Issuer:CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 12/15/2020 1:29:14 PM 12/2/2021 1:29:14 PM
Subject Chain
  • CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Version:3
Thumbprint MD5:1A1395EF5FC0A90A5B83AC4B531EEAC9
Thumbprint SHA-1:312860D2047EB81F8F58C29FF19ECDB4C634CF6A
Thumbprint SHA-256:416F4C0A00D1C4108488A04C2519325C5AA13BC80D0C017C45B00B911B8370A9
Serial:33000002ED2C45E4C145CF48440000000002ED
Instruction
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
push edi
dec eax
sub esp, 20h
dec ecx
mov edi, eax
mov ebx, edx
dec eax
mov esi, ecx
cmp edx, 01h
jne 00007F8AE0F67807h
call 00007F8AE0F67FB8h
dec esp
mov eax, edi
mov edx, ebx
dec eax
mov ecx, esi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
mov esi, dword ptr [esp+38h]
dec eax
add esp, 20h
pop edi
jmp 00007F8AE0F6780Ch
int3
int3
int3
int3
int3
int3
int3
dec eax
mov eax, esp
dec eax
mov dword ptr [eax+20h], ebx
dec esp
mov dword ptr [eax+18h], eax
mov dword ptr [eax+10h], edx
dec eax
mov dword ptr [eax+08h], ecx
push esi
push edi
inc ecx
push esi
dec eax
sub esp, 00000150h
mov edi, edx
dec esp
mov esi, ecx
mov esi, 00000001h
mov ebx, esi
mov dword ptr [esp+20h], ebx
cmp edx, esi
jnbe 00007F8AE0F67808h
mov dword ptr [000B78A5h], edx
test edx, edx
jne 00007F8AE0F67815h
cmp dword ptr [000B7C6Bh], edx
jne 00007F8AE0F6780Dh
xor ebx, ebx
mov dword ptr [esp+20h], ebx
jmp 00007F8AE0F679DFh
lea eax, dword ptr [edx-01h]
cmp eax, esi
ja 00007F8AE0F67896h
dec esp
mov ecx, dword ptr [000B825Ch]
dec ebp
test ecx, ecx
je 00007F8AE0F67844h
mov eax, dword ptr [000B7C45h]
cmp edx, esi
cmove eax, esi
mov dword ptr [000B7C3Ah], eax
dec esp
mov eax, dword ptr [esp+00000180h]
dec ecx
mov eax, ecx
call dword ptr [00000005h]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xc49c00xd4.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0xc4a940x5f0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd90000x9a8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xd10000x6474.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0xd3e000x2138.pdata
IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000x998.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xa73600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x903e00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x8f6000x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x908a00x11d8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc41fc0x140.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8d5250x8d600False0.516395197834data6.31932756603IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x8f0000x3a3ba0x3a400False0.338724684818data5.287775756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xca0000x6c780x4400False0.145163143382data1.95420448251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.pdata0xd10000x64740x6600False0.520450367647data5.87029876772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0xd80000x1800x200False0.271484375data2.27820028491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0xd90000x9a80xa00False0.39921875data3.88787898272IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xda0000x9980xa00False0.53828125data5.35713875244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
MUI0xd98e00xc8dataEnglishUnited States
RT_RCDATA0xd94980x442Windows application compatibility Shim DataBaseEnglishUnited States
RT_VERSION0xd90f00x3a4dataEnglishUnited States
DLLImport
msvcrt.dllfree, _amsg_exit, _XcptFilter, _onexit, ?terminate@@YAXXZ, ??1type_info@@UEAA@XZ, _vsnprintf, strcmp, strncmp, _lock, ??0exception@@QEAA@AEBQEBD@Z, memmove_s, _vsnprintf_s, ??0exception@@QEAA@AEBV0@@Z, toupper, _unlock, ??0exception@@QEAA@XZ, memset, ?what@exception@@UEBAPEBDXZ, ??1exception@@UEAA@XZ, swscanf_s, memmove, memcpy, memcmp, __dllonexit, wcscat_s, strerror, __CxxFrameHandler3, _wcslwr_s, fclose, malloc, _purecall, sprintf_s, _CxxThrowException, wcsncpy_s, _callnewh, ??0exception@@QEAA@AEBQEBDH@Z, swprintf_s, strnlen, _wtof, _vsnwprintf_s, _wtoi, _wsplitpath_s, wcstoul, towlower, wcsrchr, _itow_s, wcscpy_s, sscanf_s, _wcsicmp, fwprintf_s, _wcsnicmp, ??3@YAXPEAX@Z, memcpy_s, _itoa_s, _initterm, _wfopen_s, __C_specific_handler, _vsnwprintf, strcpy_s, wcschr, _wcslwr, wcsstr, strchr, wcsncmp, wcsspn, qsort, wcscmp
ntdll.dllRtlCopyUnicodeString, RtlRunOnceExecuteOnce, NtOpenProcessToken, NtQueryInformationToken, NtOpenThreadToken, RtlAdjustPrivilege, RtlAllocateAndInitializeSid, RtlFreeSid, NtQueryKey, RtlRandomEx, RtlDosPathNameToRelativeNtPathName_U, NtLoadKeyEx, RtlReleaseRelativeName, RtlImageRvaToVa, NtCreateSection, NtQuerySection, EtwTraceMessage, RtlDosPathNameToNtPathName_U, NtQueryInformationFile, NtOpenFile, RtlGetVersion, NtDeleteValueKey, NtSetValueKey, RtlImageDirectoryEntryToData, RtlVerifyVersionInfo, LdrResSearchResource, RtlTimeToTimeFields, ZwMapViewOfSection, ZwUnmapViewOfSection, ZwQuerySystemInformation, RtlGetNativeSystemInformation, RtlUpcaseUnicodeChar, RtlUnicodeStringToAnsiString, RtlUpcaseUnicodeString, RtlAnsiStringToUnicodeString, RtlxAnsiStringToUnicodeSize, RtlInitString, NtClose, NtQueryValueKey, RtlNtPathNameToDosPathName, RtlpEnsureBufferSize, ZwQueryDirectoryFile, RtlSecondsSince1970ToTime, ZwSetInformationProcess, ZwQueryInformationProcess, ZwCreateSection, ZwQueryInformationFile, ZwCreateFile, RtlGetFullPathName_UEx, ZwCreateKey, RtlFormatCurrentUserKeyPath, RtlAppendUnicodeToString, RtlAppendUnicodeStringToString, ZwQueryValueKey, RtlInitUnicodeStringEx, ZwEnumerateKey, ZwOpenKey, ZwOpenFile, RtlInitUnicodeString, RtlDosPathNameToNtPathName_U_WithStatus, RtlMultiByteToUnicodeN, RtlInitAnsiString, RtlEqualString, ZwClose, EtwEventRegister, EtwEventWrite, EtwEventUnregister, RtlCaptureContext, RtlLookupFunctionEntry, NtQueryLicenseValue, VerSetConditionMask, WinSqmIsOptedInEx, RtlValidSid, NtSuspendProcess, NtResumeProcess, RtlSubscribeWnfStateChangeNotification, NtQuerySystemInformation, RtlImageNtHeaderEx, RtlInitializeSRWLock, RtlReleaseSRWLockExclusive, RtlAcquireSRWLockExclusive, RtlTryEnterCriticalSection, RtlDeleteCriticalSection, RtlLeaveCriticalSection, RtlEnterCriticalSection, RtlInitializeCriticalSection, RtlNtStatusToDosError, RtlFreeUnicodeString, RtlStringFromGUID, RtlComputeCrc32, RtlGetPersistedStateLocation, RtlGetDeviceFamilyInfoEnum, RtlDoesFileExists_U, RtlNtStatusToDosErrorNoTeb, RtlGetNtSystemRoot, RtlIsCriticalSectionLockedByThread, NtApphelpCacheControl, RtlAllocateHeap, NtQuerySystemTime, RtlCompareMemory, RtlFreeHeap, EtwEventWriteNoRegistration, RtlVirtualUnwind
api-ms-win-core-libraryloader-l1-2-0.dllLoadLibraryExW, LoadResource, SizeofResource, FreeLibrary, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleW, LockResource, GetModuleHandleExW, GetProcAddress
api-ms-win-core-synch-l1-1-0.dllCreateEventExW, CreateMutexW, OpenEventW, OpenWaitableTimerW, CreateSemaphoreExW, EnterCriticalSection, ReleaseSemaphore, LeaveCriticalSection, InitializeCriticalSectionEx, InitializeCriticalSection, TryEnterCriticalSection, SetWaitableTimer, WaitForSingleObject, ReleaseMutex, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, CreateEventW, WaitForSingleObjectEx, OpenSemaphoreW, ReleaseSRWLockShared, CreateMutexExW, AcquireSRWLockShared, DeleteCriticalSection, ResetEvent, SetEvent
api-ms-win-core-heap-l1-1-0.dllHeapReAlloc, HeapFree, GetProcessHeap, HeapAlloc
api-ms-win-core-errorhandling-l1-1-0.dllSetErrorMode, GetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, RaiseException, SetLastError
api-ms-win-core-threadpool-l1-2-0.dllWaitForThreadpoolTimerCallbacks, CloseThreadpoolWork, CreateThreadpoolTimer, SetThreadpoolThreadMinimum, CloseThreadpool, SetThreadpoolTimer, WaitForThreadpoolWorkCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, CloseThreadpoolWait, WaitForThreadpoolWaitCallbacks, SetThreadpoolThreadMaximum, CreateThreadpool, SetThreadpoolWait, CreateThreadpoolWork, SubmitThreadpoolWork
api-ms-win-core-processthreads-l1-1-0.dllExitProcess, GetProcessId, GetCurrentProcessId, TerminateProcess, CreateProcessW, GetCurrentProcess, CreateProcessA, GetCurrentThreadId, OpenProcessToken, CreateThread, GetExitCodeProcess, GetCurrentThread, CreateProcessAsUserW, SetThreadPriority, ProcessIdToSessionId
api-ms-win-core-localization-l1-2-0.dllFormatMessageW
api-ms-win-core-debug-l1-1-0.dllOutputDebugStringA, OutputDebugStringW, DebugBreak, IsDebuggerPresent
api-ms-win-core-handle-l1-1-0.dllDuplicateHandle, CloseHandle
RPCRT4.dllUuidCreate, RpcEpUnregister, RpcRevertToSelfEx, RpcServerInqBindings, RpcServerUseProtseqW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcImpersonateClient, I_RpcBindingInqLocalClientPID, NdrServerCall2, NdrServerCallAll, RpcEpRegisterW, RpcBindingVectorFree
api-ms-win-service-core-l1-1-0.dllRegisterServiceCtrlHandlerExW, SetServiceStatus
api-ms-win-core-registry-l1-1-0.dllRegQueryValueExW, RegOpenKeyExW, RegSaveKeyExW, RegDeleteKeyExW, RegSetKeySecurity, RegEnumValueW, RegGetValueW, RegUnLoadKeyW, RegEnumKeyExW, RegDeleteTreeW, RegLoadKeyW, RegFlushKey, RegQueryInfoKeyW, RegLoadAppKeyW, RegNotifyChangeKeyValue, RegSetValueExW, RegCreateKeyExW, RegCloseKey, RegDeleteValueW
api-ms-win-core-synch-l1-2-0.dllInitOnceComplete, InitOnceBeginInitialize, WakeAllConditionVariable, SleepConditionVariableSRW, Sleep
api-ms-win-eventing-provider-l1-1-0.dllEventUnregister, EventRegister, EventWriteTransfer, EventSetInformation
api-ms-win-power-base-l1-1-0.dllPowerRegisterSuspendResumeNotification, PowerUnregisterSuspendResumeNotification
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0.dllGetVersionExW, GetSystemWindowsDirectoryW, GetSystemDirectoryW, GetTickCount, GetTickCount64, GetLocalTime, GetSystemTime, GetSystemInfo, GetSystemTimeAsFileTime, GlobalMemoryStatusEx
api-ms-win-core-kernel32-legacy-l1-1-0.dllUnregisterWait, WTSGetActiveConsoleSessionId
APISAMPLING.dllAPISamplingSetValue, APISamplingUninitialize, APISamplingInitialize
api-ms-win-core-job-l2-1-0.dllCreateJobObjectW, AssignProcessToJobObject, SetInformationJobObject, QueryInformationJobObject
api-ms-win-core-kernel32-private-l1-1-0.dllCheckElevationEnabled
USER32.dllLoadStringW
api-ms-win-core-processthreads-l1-1-1.dllGetThreadTimes, OpenProcess, IsProcessorFeaturePresent
api-ms-win-core-file-l1-1-0.dllSetFilePointer, FindClose, GetFileAttributesW, GetFileSizeEx, WriteFile, CreateFileA, GetDriveTypeW, CreateFileW, GetTempFileNameW, GetFileInformationByHandle, GetVolumeInformationByHandleW, GetVolumeInformationW, GetFileTime, CreateDirectoryW, DeleteFileW, GetLongPathNameW, FindNextFileW, QueryDosDeviceW, GetFileSize, ReadFile, GetLogicalDriveStringsW, GetShortPathNameW, FindFirstFileW, GetDiskFreeSpaceExW
api-ms-win-security-base-l1-1-0.dllRevertToSelf, FreeSid, ImpersonateLoggedOnUser, GetTokenInformation, AddAccessAllowedAce, InitializeAcl, AllocateAndInitializeSid, GetLengthSid, SetSecurityDescriptorOwner, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, SetSecurityDescriptorGroup
api-ms-win-security-sddl-l1-1-0.dllConvertSidToStringSidW
api-ms-win-core-heap-l2-1-0.dllLocalFree, LocalAlloc, GlobalFree
api-ms-win-core-io-l1-1-0.dllPostQueuedCompletionStatus, CreateIoCompletionPort, GetQueuedCompletionStatus, DeviceIoControl
api-ms-win-core-job-l1-1-0.dllIsProcessInJob
api-ms-win-core-memory-l1-1-0.dllCreateFileMappingW, WriteProcessMemory, UnmapViewOfFile, MapViewOfFile
api-ms-win-core-com-l1-1-0.dllStringFromGUID2, CoGetInterfaceAndReleaseStream, CoTaskMemFree, CoGetClassObject, CoReleaseMarshalData, CoCancelCall, CoUninitialize, CoDisableCallCancellation, CoEnableCallCancellation, CoCreateGuid, CoCreateInstance, CoWaitForMultipleHandles, CoInitializeEx, CoMarshalInterThreadInterfaceInStream
api-ms-win-core-path-l1-1-0.dllPathIsUNCEx, PathCchRemoveFileSpec
api-ms-win-core-psapi-l1-1-0.dllK32GetModuleFileNameExW, QueryFullProcessImageNameW
api-ms-win-core-processenvironment-l1-1-0.dllFreeEnvironmentStringsW, GetEnvironmentStringsW, ExpandEnvironmentStringsA, GetCommandLineW, ExpandEnvironmentStringsW
api-ms-win-core-registry-l1-1-1.dllRegDeleteKeyValueW, RegSetKeyValueW
api-ms-win-core-sysinfo-l1-2-0.dllGetSystemFirmwareTable, GetNativeSystemInfo
api-ms-win-core-file-l1-2-0.dllGetVolumeNameForVolumeMountPointW, GetTempPathW
OLEAUT32.dllSysAllocString, VariantInit, SysFreeString
CRYPT32.dllCertVerifyCertificateChainPolicy
WINHTTP.dllWinHttpReadData, WinHttpGetIEProxyConfigForCurrentUser, WinHttpSendRequest, WinHttpQueryAuthSchemes, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpGetDefaultProxyConfiguration, WinHttpOpen, WinHttpCrackUrl, WinHttpGetProxyForUrl, WinHttpConnect, WinHttpAddRequestHeaders, WinHttpOpenRequest, WinHttpReceiveResponse, WinHttpSetOption, WinHttpQueryHeaders, WinHttpCloseHandle
api-ms-win-core-file-l2-1-0.dllMoveFileExW
api-ms-win-core-file-l2-1-2.dllCopyFileW
api-ms-win-eventing-controller-l1-1-0.dllControlTraceW, EnableTraceEx2, StartTraceW
api-ms-win-eventing-consumer-l1-1-0.dllOpenTraceW, CloseTrace, ProcessTrace
api-ms-win-core-realtime-l1-1-0.dllQueryUnbiasedInterruptTime
api-ms-win-core-string-l1-1-0.dllMultiByteToWideChar, CompareStringOrdinal
api-ms-win-devices-config-l1-1-1.dllCM_Get_Device_IDW, CM_Register_Notification, CM_Get_Parent, CM_Unregister_Notification
api-ms-win-core-synch-l1-2-1.dllWaitForMultipleObjects, CreateWaitableTimerW, CreateSemaphoreW
api-ms-win-core-libraryloader-l1-2-1.dllFindResourceW
api-ms-win-core-winrt-l1-1-0.dllRoGetActivationFactory, RoInitialize, RoUninitialize, RoActivateInstance
api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
api-ms-win-core-threadpool-legacy-l1-1-0.dllDeleteTimerQueueTimer, ChangeTimerQueueTimer, QueueUserWorkItem, CreateTimerQueueTimer
api-ms-win-core-shlwapi-legacy-l1-1-0.dllPathRemoveExtensionW, PathGetDriveNumberW, PathFindExtensionW, PathFileExistsW, PathAppendW, PathSkipRootW, PathFindFileNameW, PathStripPathW
api-ms-win-core-registry-l2-1-0.dllRegOpenKeyW, RegDeleteKeyW
api-ms-win-core-kernel32-legacy-l1-1-1.dllVerifyVersionInfoW
api-ms-win-core-appcompat-l1-1-1.dllBaseFreeAppCompatDataForProcess, BaseReadAppCompatDataForProcess
tdh.dllTdhGetProperty, TdhGetPropertySize
SETUPAPI.dllSetupIterateCabinetW
api-ms-win-core-url-l1-1-0.dllUrlGetPartW
api-ms-win-oobe-notification-l1-1-0.dllOOBEComplete
apphelp.dllSetPermLayerState
api-ms-win-core-sidebyside-l1-1-0.dllReleaseActCtx, QueryActCtxW, CreateActCtxW
api-ms-win-core-timezone-l1-1-0.dllSystemTimeToFileTime, FileTimeToSystemTime
USERENV.dllExpandEnvironmentStringsForUserW
api-ms-win-core-com-l1-1-1.dllRoGetAgileReference
api-ms-win-core-version-l1-1-1.dllGetFileVersionInfoW, GetFileVersionInfoSizeW
api-ms-win-core-version-l1-1-0.dllVerQueryValueW
api-ms-win-security-credentials-l1-1-0.dllCredReadW
api-ms-win-core-winrt-string-l1-1-0.dllWindowsGetStringRawBuffer, WindowsDeleteString, WindowsCreateString, WindowsCreateStringReference
api-ms-win-core-string-obsolete-l1-1-0.dlllstrcmpW, lstrcmpiW
api-ms-win-security-cryptoapi-l1-1-0.dllCryptDestroyHash, CryptReleaseContext, CryptGetHashParam, CryptHashData, CryptAcquireContextW, CryptCreateHash
api-ms-win-shcore-taskpool-l1-1-0.dllSHTaskPoolQueueTask
NameOrdinalAddress
PcaPatchSdbTask10x18001e3e0
QueryEncapsulationSettings20x18001e260
QueryEncapsulationSettingsTC30x18001e2f0
ServiceMain40x180013580
SvchostPushServiceGlobals50x180015d90
DescriptionData
LegalCopyright Microsoft Corporation. All rights reserved.
InternalName
FileVersion10.0.19041.1202 (WinBuild.160101.0800)
CompanyNameMicrosoft Corporation
ProductNameMicrosoft Windows Operating System
ProductVersion10.0.19041.1202
FileDescriptionProgram Compatibility Assistant Service
OriginalFilenamepcasvc.dll
Translation0x0409 0x04b0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:08:03:32
Start date:06/10/2021
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1
Imagebase:0x7ff78f3e0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:03:32
Start date:06/10/2021
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,PcaPatchSdbTask
Imagebase:0x7ff7aae90000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:03:32
Start date:06/10/2021
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe 'C:\Users\user\Desktop\PcaSvc.dll',#1
Imagebase:0x7ff7aae90000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:03:35
Start date:06/10/2021
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettings
Imagebase:0x7ff7aae90000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:03:39
Start date:06/10/2021
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\PcaSvc.dll,QueryEncapsulationSettingsTC
Imagebase:0x7ff7aae90000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis