Windows Analysis Report PcaSvc.dll
Overview
General Information
Detection
Score: | 3 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary string: |
Source: | Classification label: |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process queried: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | DLL Side-Loading1 | Process Injection11 | Virtualization/Sandbox Evasion1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | DLL Side-Loading1 | Rundll321 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection11 | Security Account Manager | System Information Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Timestomp1 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | DLL Side-Loading1 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 497676 |
Start date: | 06.10.2021 |
Start time: | 08:02:40 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | PcaSvc.dll |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 27 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean3.winDLL@11/0@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.343812707574443 |
TrID: |
|
File name: | PcaSvc.dll |
File size: | 876344 |
MD5: | c01a9d3e01e0519140f9e2b266bbf4a0 |
SHA1: | 478b1f1fb8be008b22ac8034714ca717544c6f67 |
SHA256: | 156a0e4d76e24922dda8ecb2d80a7754d1627246d9dd66dddbe46304fec3f472 |
SHA512: | 5c59aa2a76189c654ce1acff067cb9df44d56974d617eff954f9b6f68a385dfb4c54f31c4e8e38264d73ae272886c3e53c1a2e70b905dcef3d86323c7cc50ff2 |
SSDEEP: | 24576:GIdDBe0fbgZw/9FuKw4rsNkEQTHwzm+Zq2queGie:GI3e0fcqeLNkEEYPq2qu/ |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.. ...s...s...s..ss...s...r...s...r...s...s^..s...r...s...r...s...r...s...r...s...s...s...r...sRich...s................PE..d.. |
File Icon |
---|
Icon Hash: | 74f0e4ecccdce0e4 |
General | |
---|---|
Entrypoint: | 0x1800165b0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x180000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE |
DLL Characteristics: | GUARD_CF, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA |
Time Stamp: | 0x8226DCB8 [Sat Mar 12 23:22:32 2039 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 10 |
OS Version Minor: | 0 |
File Version Major: | 10 |
File Version Minor: | 0 |
Subsystem Version Major: | 10 |
Subsystem Version Minor: | 0 |
Import Hash: | 5bb5a2e1975ae78207abb2b6f6ef800f |
Signature Valid: | true |
Signature Issuer: | CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 1A1395EF5FC0A90A5B83AC4B531EEAC9 |
Thumbprint SHA-1: | 312860D2047EB81F8F58C29FF19ECDB4C634CF6A |
Thumbprint SHA-256: | 416F4C0A00D1C4108488A04C2519325C5AA13BC80D0C017C45B00B911B8370A9 |
Serial: | 33000002ED2C45E4C145CF48440000000002ED |
Instruction |
---|
dec eax |
mov dword ptr [esp+08h], ebx |
dec eax |
mov dword ptr [esp+10h], esi |
push edi |
dec eax |
sub esp, 20h |
dec ecx |
mov edi, eax |
mov ebx, edx |
dec eax |
mov esi, ecx |
cmp edx, 01h |
jne 00007F8AE0F67807h |
call 00007F8AE0F67FB8h |
dec esp |
mov eax, edi |
mov edx, ebx |
dec eax |
mov ecx, esi |
dec eax |
mov ebx, dword ptr [esp+30h] |
dec eax |
mov esi, dword ptr [esp+38h] |
dec eax |
add esp, 20h |
pop edi |
jmp 00007F8AE0F6780Ch |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov eax, esp |
dec eax |
mov dword ptr [eax+20h], ebx |
dec esp |
mov dword ptr [eax+18h], eax |
mov dword ptr [eax+10h], edx |
dec eax |
mov dword ptr [eax+08h], ecx |
push esi |
push edi |
inc ecx |
push esi |
dec eax |
sub esp, 00000150h |
mov edi, edx |
dec esp |
mov esi, ecx |
mov esi, 00000001h |
mov ebx, esi |
mov dword ptr [esp+20h], ebx |
cmp edx, esi |
jnbe 00007F8AE0F67808h |
mov dword ptr [000B78A5h], edx |
test edx, edx |
jne 00007F8AE0F67815h |
cmp dword ptr [000B7C6Bh], edx |
jne 00007F8AE0F6780Dh |
xor ebx, ebx |
mov dword ptr [esp+20h], ebx |
jmp 00007F8AE0F679DFh |
lea eax, dword ptr [edx-01h] |
cmp eax, esi |
ja 00007F8AE0F67896h |
dec esp |
mov ecx, dword ptr [000B825Ch] |
dec ebp |
test ecx, ecx |
je 00007F8AE0F67844h |
mov eax, dword ptr [000B7C45h] |
cmp edx, esi |
cmove eax, esi |
mov dword ptr [000B7C3Ah], eax |
dec esp |
mov eax, dword ptr [esp+00000180h] |
dec ecx |
mov eax, ecx |
call dword ptr [00000005h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xc49c0 | 0xd4 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xc4a94 | 0x5f0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xd9000 | 0x9a8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xd1000 | 0x6474 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xd3e00 | 0x2138 | .pdata |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xda000 | 0x998 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa7360 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x903e0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x8f600 | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x908a0 | 0x11d8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0xc41fc | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8d525 | 0x8d600 | False | 0.516395197834 | data | 6.31932756603 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x8f000 | 0x3a3ba | 0x3a400 | False | 0.338724684818 | data | 5.287775756 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xca000 | 0x6c78 | 0x4400 | False | 0.145163143382 | data | 1.95420448251 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.pdata | 0xd1000 | 0x6474 | 0x6600 | False | 0.520450367647 | data | 5.87029876772 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0xd8000 | 0x180 | 0x200 | False | 0.271484375 | data | 2.27820028491 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0xd9000 | 0x9a8 | 0xa00 | False | 0.39921875 | data | 3.88787898272 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xda000 | 0x998 | 0xa00 | False | 0.53828125 | data | 5.35713875244 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
MUI | 0xd98e0 | 0xc8 | data | English | United States |
RT_RCDATA | 0xd9498 | 0x442 | Windows application compatibility Shim DataBase | English | United States |
RT_VERSION | 0xd90f0 | 0x3a4 | data | English | United States |
DLL | Import |
---|---|
msvcrt.dll | free, _amsg_exit, _XcptFilter, _onexit, ?terminate@@YAXXZ, ??1type_info@@UEAA@XZ, _vsnprintf, strcmp, strncmp, _lock, ??0exception@@QEAA@AEBQEBD@Z, memmove_s, _vsnprintf_s, ??0exception@@QEAA@AEBV0@@Z, toupper, _unlock, ??0exception@@QEAA@XZ, memset, ?what@exception@@UEBAPEBDXZ, ??1exception@@UEAA@XZ, swscanf_s, memmove, memcpy, memcmp, __dllonexit, wcscat_s, strerror, __CxxFrameHandler3, _wcslwr_s, fclose, malloc, _purecall, sprintf_s, _CxxThrowException, wcsncpy_s, _callnewh, ??0exception@@QEAA@AEBQEBDH@Z, swprintf_s, strnlen, _wtof, _vsnwprintf_s, _wtoi, _wsplitpath_s, wcstoul, towlower, wcsrchr, _itow_s, wcscpy_s, sscanf_s, _wcsicmp, fwprintf_s, _wcsnicmp, ??3@YAXPEAX@Z, memcpy_s, _itoa_s, _initterm, _wfopen_s, __C_specific_handler, _vsnwprintf, strcpy_s, wcschr, _wcslwr, wcsstr, strchr, wcsncmp, wcsspn, qsort, wcscmp |
ntdll.dll | RtlCopyUnicodeString, RtlRunOnceExecuteOnce, NtOpenProcessToken, NtQueryInformationToken, NtOpenThreadToken, RtlAdjustPrivilege, RtlAllocateAndInitializeSid, RtlFreeSid, NtQueryKey, RtlRandomEx, RtlDosPathNameToRelativeNtPathName_U, NtLoadKeyEx, RtlReleaseRelativeName, RtlImageRvaToVa, NtCreateSection, NtQuerySection, EtwTraceMessage, RtlDosPathNameToNtPathName_U, NtQueryInformationFile, NtOpenFile, RtlGetVersion, NtDeleteValueKey, NtSetValueKey, RtlImageDirectoryEntryToData, RtlVerifyVersionInfo, LdrResSearchResource, RtlTimeToTimeFields, ZwMapViewOfSection, ZwUnmapViewOfSection, ZwQuerySystemInformation, RtlGetNativeSystemInformation, RtlUpcaseUnicodeChar, RtlUnicodeStringToAnsiString, RtlUpcaseUnicodeString, RtlAnsiStringToUnicodeString, RtlxAnsiStringToUnicodeSize, RtlInitString, NtClose, NtQueryValueKey, RtlNtPathNameToDosPathName, RtlpEnsureBufferSize, ZwQueryDirectoryFile, RtlSecondsSince1970ToTime, ZwSetInformationProcess, ZwQueryInformationProcess, ZwCreateSection, ZwQueryInformationFile, ZwCreateFile, RtlGetFullPathName_UEx, ZwCreateKey, RtlFormatCurrentUserKeyPath, RtlAppendUnicodeToString, RtlAppendUnicodeStringToString, ZwQueryValueKey, RtlInitUnicodeStringEx, ZwEnumerateKey, ZwOpenKey, ZwOpenFile, RtlInitUnicodeString, RtlDosPathNameToNtPathName_U_WithStatus, RtlMultiByteToUnicodeN, RtlInitAnsiString, RtlEqualString, ZwClose, EtwEventRegister, EtwEventWrite, EtwEventUnregister, RtlCaptureContext, RtlLookupFunctionEntry, NtQueryLicenseValue, VerSetConditionMask, WinSqmIsOptedInEx, RtlValidSid, NtSuspendProcess, NtResumeProcess, RtlSubscribeWnfStateChangeNotification, NtQuerySystemInformation, RtlImageNtHeaderEx, RtlInitializeSRWLock, RtlReleaseSRWLockExclusive, RtlAcquireSRWLockExclusive, RtlTryEnterCriticalSection, RtlDeleteCriticalSection, RtlLeaveCriticalSection, RtlEnterCriticalSection, RtlInitializeCriticalSection, RtlNtStatusToDosError, RtlFreeUnicodeString, RtlStringFromGUID, RtlComputeCrc32, RtlGetPersistedStateLocation, RtlGetDeviceFamilyInfoEnum, RtlDoesFileExists_U, RtlNtStatusToDosErrorNoTeb, RtlGetNtSystemRoot, RtlIsCriticalSectionLockedByThread, NtApphelpCacheControl, RtlAllocateHeap, NtQuerySystemTime, RtlCompareMemory, RtlFreeHeap, EtwEventWriteNoRegistration, RtlVirtualUnwind |
api-ms-win-core-libraryloader-l1-2-0.dll | LoadLibraryExW, LoadResource, SizeofResource, FreeLibrary, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleW, LockResource, GetModuleHandleExW, GetProcAddress |
api-ms-win-core-synch-l1-1-0.dll | CreateEventExW, CreateMutexW, OpenEventW, OpenWaitableTimerW, CreateSemaphoreExW, EnterCriticalSection, ReleaseSemaphore, LeaveCriticalSection, InitializeCriticalSectionEx, InitializeCriticalSection, TryEnterCriticalSection, SetWaitableTimer, WaitForSingleObject, ReleaseMutex, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, CreateEventW, WaitForSingleObjectEx, OpenSemaphoreW, ReleaseSRWLockShared, CreateMutexExW, AcquireSRWLockShared, DeleteCriticalSection, ResetEvent, SetEvent |
api-ms-win-core-heap-l1-1-0.dll | HeapReAlloc, HeapFree, GetProcessHeap, HeapAlloc |
api-ms-win-core-errorhandling-l1-1-0.dll | SetErrorMode, GetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, RaiseException, SetLastError |
api-ms-win-core-threadpool-l1-2-0.dll | WaitForThreadpoolTimerCallbacks, CloseThreadpoolWork, CreateThreadpoolTimer, SetThreadpoolThreadMinimum, CloseThreadpool, SetThreadpoolTimer, WaitForThreadpoolWorkCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, CloseThreadpoolWait, WaitForThreadpoolWaitCallbacks, SetThreadpoolThreadMaximum, CreateThreadpool, SetThreadpoolWait, CreateThreadpoolWork, SubmitThreadpoolWork |
api-ms-win-core-processthreads-l1-1-0.dll | ExitProcess, GetProcessId, GetCurrentProcessId, TerminateProcess, CreateProcessW, GetCurrentProcess, CreateProcessA, GetCurrentThreadId, OpenProcessToken, CreateThread, GetExitCodeProcess, GetCurrentThread, CreateProcessAsUserW, SetThreadPriority, ProcessIdToSessionId |
api-ms-win-core-localization-l1-2-0.dll | FormatMessageW |
api-ms-win-core-debug-l1-1-0.dll | OutputDebugStringA, OutputDebugStringW, DebugBreak, IsDebuggerPresent |
api-ms-win-core-handle-l1-1-0.dll | DuplicateHandle, CloseHandle |
RPCRT4.dll | UuidCreate, RpcEpUnregister, RpcRevertToSelfEx, RpcServerInqBindings, RpcServerUseProtseqW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcImpersonateClient, I_RpcBindingInqLocalClientPID, NdrServerCall2, NdrServerCallAll, RpcEpRegisterW, RpcBindingVectorFree |
api-ms-win-service-core-l1-1-0.dll | RegisterServiceCtrlHandlerExW, SetServiceStatus |
api-ms-win-core-registry-l1-1-0.dll | RegQueryValueExW, RegOpenKeyExW, RegSaveKeyExW, RegDeleteKeyExW, RegSetKeySecurity, RegEnumValueW, RegGetValueW, RegUnLoadKeyW, RegEnumKeyExW, RegDeleteTreeW, RegLoadKeyW, RegFlushKey, RegQueryInfoKeyW, RegLoadAppKeyW, RegNotifyChangeKeyValue, RegSetValueExW, RegCreateKeyExW, RegCloseKey, RegDeleteValueW |
api-ms-win-core-synch-l1-2-0.dll | InitOnceComplete, InitOnceBeginInitialize, WakeAllConditionVariable, SleepConditionVariableSRW, Sleep |
api-ms-win-eventing-provider-l1-1-0.dll | EventUnregister, EventRegister, EventWriteTransfer, EventSetInformation |
api-ms-win-power-base-l1-1-0.dll | PowerRegisterSuspendResumeNotification, PowerUnregisterSuspendResumeNotification |
api-ms-win-core-profile-l1-1-0.dll | QueryPerformanceCounter |
api-ms-win-core-sysinfo-l1-1-0.dll | GetVersionExW, GetSystemWindowsDirectoryW, GetSystemDirectoryW, GetTickCount, GetTickCount64, GetLocalTime, GetSystemTime, GetSystemInfo, GetSystemTimeAsFileTime, GlobalMemoryStatusEx |
api-ms-win-core-kernel32-legacy-l1-1-0.dll | UnregisterWait, WTSGetActiveConsoleSessionId |
APISAMPLING.dll | APISamplingSetValue, APISamplingUninitialize, APISamplingInitialize |
api-ms-win-core-job-l2-1-0.dll | CreateJobObjectW, AssignProcessToJobObject, SetInformationJobObject, QueryInformationJobObject |
api-ms-win-core-kernel32-private-l1-1-0.dll | CheckElevationEnabled |
USER32.dll | LoadStringW |
api-ms-win-core-processthreads-l1-1-1.dll | GetThreadTimes, OpenProcess, IsProcessorFeaturePresent |
api-ms-win-core-file-l1-1-0.dll | SetFilePointer, FindClose, GetFileAttributesW, GetFileSizeEx, WriteFile, CreateFileA, GetDriveTypeW, CreateFileW, GetTempFileNameW, GetFileInformationByHandle, GetVolumeInformationByHandleW, GetVolumeInformationW, GetFileTime, CreateDirectoryW, DeleteFileW, GetLongPathNameW, FindNextFileW, QueryDosDeviceW, GetFileSize, ReadFile, GetLogicalDriveStringsW, GetShortPathNameW, FindFirstFileW, GetDiskFreeSpaceExW |
api-ms-win-security-base-l1-1-0.dll | RevertToSelf, FreeSid, ImpersonateLoggedOnUser, GetTokenInformation, AddAccessAllowedAce, InitializeAcl, AllocateAndInitializeSid, GetLengthSid, SetSecurityDescriptorOwner, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, SetSecurityDescriptorGroup |
api-ms-win-security-sddl-l1-1-0.dll | ConvertSidToStringSidW |
api-ms-win-core-heap-l2-1-0.dll | LocalFree, LocalAlloc, GlobalFree |
api-ms-win-core-io-l1-1-0.dll | PostQueuedCompletionStatus, CreateIoCompletionPort, GetQueuedCompletionStatus, DeviceIoControl |
api-ms-win-core-job-l1-1-0.dll | IsProcessInJob |
api-ms-win-core-memory-l1-1-0.dll | CreateFileMappingW, WriteProcessMemory, UnmapViewOfFile, MapViewOfFile |
api-ms-win-core-com-l1-1-0.dll | StringFromGUID2, CoGetInterfaceAndReleaseStream, CoTaskMemFree, CoGetClassObject, CoReleaseMarshalData, CoCancelCall, CoUninitialize, CoDisableCallCancellation, CoEnableCallCancellation, CoCreateGuid, CoCreateInstance, CoWaitForMultipleHandles, CoInitializeEx, CoMarshalInterThreadInterfaceInStream |
api-ms-win-core-path-l1-1-0.dll | PathIsUNCEx, PathCchRemoveFileSpec |
api-ms-win-core-psapi-l1-1-0.dll | K32GetModuleFileNameExW, QueryFullProcessImageNameW |
api-ms-win-core-processenvironment-l1-1-0.dll | FreeEnvironmentStringsW, GetEnvironmentStringsW, ExpandEnvironmentStringsA, GetCommandLineW, ExpandEnvironmentStringsW |
api-ms-win-core-registry-l1-1-1.dll | RegDeleteKeyValueW, RegSetKeyValueW |
api-ms-win-core-sysinfo-l1-2-0.dll | GetSystemFirmwareTable, GetNativeSystemInfo |
api-ms-win-core-file-l1-2-0.dll | GetVolumeNameForVolumeMountPointW, GetTempPathW |
OLEAUT32.dll | SysAllocString, VariantInit, SysFreeString |
CRYPT32.dll | CertVerifyCertificateChainPolicy |
WINHTTP.dll | WinHttpReadData, WinHttpGetIEProxyConfigForCurrentUser, WinHttpSendRequest, WinHttpQueryAuthSchemes, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpGetDefaultProxyConfiguration, WinHttpOpen, WinHttpCrackUrl, WinHttpGetProxyForUrl, WinHttpConnect, WinHttpAddRequestHeaders, WinHttpOpenRequest, WinHttpReceiveResponse, WinHttpSetOption, WinHttpQueryHeaders, WinHttpCloseHandle |
api-ms-win-core-file-l2-1-0.dll | MoveFileExW |
api-ms-win-core-file-l2-1-2.dll | CopyFileW |
api-ms-win-eventing-controller-l1-1-0.dll | ControlTraceW, EnableTraceEx2, StartTraceW |
api-ms-win-eventing-consumer-l1-1-0.dll | OpenTraceW, CloseTrace, ProcessTrace |
api-ms-win-core-realtime-l1-1-0.dll | QueryUnbiasedInterruptTime |
api-ms-win-core-string-l1-1-0.dll | MultiByteToWideChar, CompareStringOrdinal |
api-ms-win-devices-config-l1-1-1.dll | CM_Get_Device_IDW, CM_Register_Notification, CM_Get_Parent, CM_Unregister_Notification |
api-ms-win-core-synch-l1-2-1.dll | WaitForMultipleObjects, CreateWaitableTimerW, CreateSemaphoreW |
api-ms-win-core-libraryloader-l1-2-1.dll | FindResourceW |
api-ms-win-core-winrt-l1-1-0.dll | RoGetActivationFactory, RoInitialize, RoUninitialize, RoActivateInstance |
api-ms-win-core-delayload-l1-1-1.dll | ResolveDelayLoadedAPI |
api-ms-win-core-delayload-l1-1-0.dll | DelayLoadFailureHook |
api-ms-win-core-threadpool-legacy-l1-1-0.dll | DeleteTimerQueueTimer, ChangeTimerQueueTimer, QueueUserWorkItem, CreateTimerQueueTimer |
api-ms-win-core-shlwapi-legacy-l1-1-0.dll | PathRemoveExtensionW, PathGetDriveNumberW, PathFindExtensionW, PathFileExistsW, PathAppendW, PathSkipRootW, PathFindFileNameW, PathStripPathW |
api-ms-win-core-registry-l2-1-0.dll | RegOpenKeyW, RegDeleteKeyW |
api-ms-win-core-kernel32-legacy-l1-1-1.dll | VerifyVersionInfoW |
api-ms-win-core-appcompat-l1-1-1.dll | BaseFreeAppCompatDataForProcess, BaseReadAppCompatDataForProcess |
tdh.dll | TdhGetProperty, TdhGetPropertySize |
SETUPAPI.dll | SetupIterateCabinetW |
api-ms-win-core-url-l1-1-0.dll | UrlGetPartW |
api-ms-win-oobe-notification-l1-1-0.dll | OOBEComplete |
apphelp.dll | SetPermLayerState |
api-ms-win-core-sidebyside-l1-1-0.dll | ReleaseActCtx, QueryActCtxW, CreateActCtxW |
api-ms-win-core-timezone-l1-1-0.dll | SystemTimeToFileTime, FileTimeToSystemTime |
USERENV.dll | ExpandEnvironmentStringsForUserW |
api-ms-win-core-com-l1-1-1.dll | RoGetAgileReference |
api-ms-win-core-version-l1-1-1.dll | GetFileVersionInfoW, GetFileVersionInfoSizeW |
api-ms-win-core-version-l1-1-0.dll | VerQueryValueW |
api-ms-win-security-credentials-l1-1-0.dll | CredReadW |
api-ms-win-core-winrt-string-l1-1-0.dll | WindowsGetStringRawBuffer, WindowsDeleteString, WindowsCreateString, WindowsCreateStringReference |
api-ms-win-core-string-obsolete-l1-1-0.dll | lstrcmpW, lstrcmpiW |
api-ms-win-security-cryptoapi-l1-1-0.dll | CryptDestroyHash, CryptReleaseContext, CryptGetHashParam, CryptHashData, CryptAcquireContextW, CryptCreateHash |
api-ms-win-shcore-taskpool-l1-1-0.dll | SHTaskPoolQueueTask |
Name | Ordinal | Address |
---|---|---|
PcaPatchSdbTask | 1 | 0x18001e3e0 |
QueryEncapsulationSettings | 2 | 0x18001e260 |
QueryEncapsulationSettingsTC | 3 | 0x18001e2f0 |
ServiceMain | 4 | 0x180013580 |
SvchostPushServiceGlobals | 5 | 0x180015d90 |
Description | Data |
---|---|
LegalCopyright | Microsoft Corporation. All rights reserved. |
InternalName | |
FileVersion | 10.0.19041.1202 (WinBuild.160101.0800) |
CompanyName | Microsoft Corporation |
ProductName | Microsoft Windows Operating System |
ProductVersion | 10.0.19041.1202 |
FileDescription | Program Compatibility Assistant Service |
OriginalFilename | pcasvc.dll |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 08:03:31 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff640820000 |
File size: | 1136128 bytes |
MD5 hash: | E0CC9D126C39A9D2FA1CAD5027EBBD18 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 08:03:32 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff78f3e0000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 08:03:32 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7aae90000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 08:03:32 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7aae90000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 08:03:35 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7aae90000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 08:03:39 |
Start date: | 06/10/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7aae90000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|