Windows
Analysis Report
IKEEXT.DLL.dll
Overview
General Information
Detection
Score: | 23 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
loaddll64.exe (PID: 6104 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\IKE EXT.DLL.dl l" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6) conhost.exe (PID: 6112 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) cmd.exe (PID: 6140 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\IKE EXT.DLL.dl l",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F) rundll32.exe (PID: 5300 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\IKEE XT.DLL.dll ",#1 MD5: 73C519F050C20580F8A62C849D49215A) rundll32.exe (PID: 5232 cmdline:
rundll32.e xe C:\User s\user\Des ktop\IKEEX T.DLL.dll, IkeService Main MD5: 73C519F050C20580F8A62C849D49215A) rundll32.exe (PID: 2904 cmdline:
rundll32.e xe C:\User s\user\Des ktop\IKEEX T.DLL.dll, SvchostPus hServiceGl obals MD5: 73C519F050C20580F8A62C849D49215A)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: |
Source: | Classification label: |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process queried: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | 1 Network Sniffing | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Rundll32 | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 Network Sniffing | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 DLL Side-Loading | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 793487 |
Start date and time: | 2023-01-28 11:26:06 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | IKEEXT.DLL.dll (renamed file extension from exe to dll) |
Detection: | SUS |
Classification: | sus23.troj.winDLL@10/0@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Not all processes where analyz
ed, report is missing behavior information
File type: | |
Entropy (8bit): | 6.260282436931228 |
TrID: |
|
File name: | IKEEXT.DLL.dll |
File size: | 1055232 |
MD5: | fef66efb3a08608ce0b215b1f5441eb6 |
SHA1: | 93e6d882ea3cf90159f7b7a1f36b6fb8b1b0912e |
SHA256: | 24e0c790fe25464d2ef6b4018b907ff9ba97cafddd1da305ab71ea0b4b2a13f2 |
SHA512: | cf62333768f8967046233eb9909766132d9c58c5639eb18e6d7ceba586ca77e4e2a014badcd21aaa702abd5859b44f6ccda19b69585419710f35aa590f43c90f |
SSDEEP: | 24576:ZVKkHwZOqWfJtvhKrQb+9T9p3AobuPCkngnranPC8D2hNcNvfGqAp:vKkHwZNWfJtvhKrQb+9T9p3AobuP3ngp |
TLSH: | 24254AAD62F001A9E87AD178CA915707D6F2B828277096DF42B081782F53FD36A3DF54 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._..._..._...V.......K.{.P...K.|.\..._.~.....K.~.R...K...^...K.r.5...K...^...K.}.^...Rich_...........PE..d.....c..........." |
Icon Hash: | 74f0e4ecccdce0e4 |
Entrypoint: | 0x18002c150 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x180000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF |
Time Stamp: | 0xC630EDB [Mon Aug 2 07:20:59 1976 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 10 |
OS Version Minor: | 0 |
File Version Major: | 10 |
File Version Minor: | 0 |
Subsystem Version Major: | 10 |
Subsystem Version Minor: | 0 |
Import Hash: | 58c366547f57d097b2105719ecab56e4 |
Instruction |
---|
dec eax |
mov dword ptr [esp+08h], ebx |
dec eax |
mov dword ptr [esp+10h], esi |
push edi |
dec eax |
sub esp, 20h |
dec ecx |
mov edi, eax |
mov ebx, edx |
dec eax |
mov esi, ecx |
cmp edx, 01h |
jne 00007F61E8ECAB37h |
call 00007F61E8ECAED8h |
dec esp |
mov eax, edi |
mov edx, ebx |
dec eax |
mov ecx, esi |
dec eax |
mov ebx, dword ptr [esp+30h] |
dec eax |
mov esi, dword ptr [esp+38h] |
dec eax |
add esp, 20h |
pop edi |
jmp 00007F61E8ECAB3Ch |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov eax, esp |
dec eax |
mov dword ptr [eax+20h], ebx |
dec esp |
mov dword ptr [eax+18h], eax |
mov dword ptr [eax+10h], edx |
dec eax |
mov dword ptr [eax+08h], ecx |
push esi |
push edi |
inc ecx |
push esi |
dec eax |
sub esp, 00000150h |
mov edi, edx |
dec esp |
mov esi, ecx |
mov esi, 00000001h |
mov ebx, esi |
mov dword ptr [esp+20h], ebx |
cmp edx, esi |
jnbe 00007F61E8ECAB38h |
mov dword ptr [000CE135h], edx |
test edx, edx |
jne 00007F61E8ECAB45h |
cmp dword ptr [000CF86Bh], edx |
jne 00007F61E8ECAB3Dh |
xor ebx, ebx |
mov dword ptr [esp+20h], ebx |
jmp 00007F61E8ECAD0Fh |
lea eax, dword ptr [edx-01h] |
cmp eax, esi |
ja 00007F61E8ECABC6h |
dec esp |
mov ecx, dword ptr [000CFE6Ch] |
dec ebp |
test ecx, ecx |
je 00007F61E8ECAB74h |
mov eax, dword ptr [000CF845h] |
cmp edx, esi |
cmove eax, esi |
mov dword ptr [000CF83Ah], eax |
dec esp |
mov eax, dword ptr [esp+00000180h] |
dec ecx |
mov eax, ecx |
call dword ptr [000000DDh] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xf6ca0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf6d10 | 0x35c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x108000 | 0x500 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x100000 | 0x6498 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x109000 | 0x964 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xd8170 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xce0e0 | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xd3bc8 | 0xb28 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0xf5900 | 0x1e0 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xcc2b4 | 0xcc400 | False | 0.4850252447980416 | data | 6.355294718024251 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xce000 | 0x2bb80 | 0x2bc00 | False | 0.31106026785714286 | data | 4.658524030034863 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xfa000 | 0x56b8 | 0x1c00 | False | 0.1025390625 | data | 2.001065105219351 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x100000 | 0x6498 | 0x6600 | False | 0.5329350490196079 | data | 5.94628144844369 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0x107000 | 0x3b8 | 0x400 | False | 0.2890625 | data | 3.147110205494948 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x108000 | 0x500 | 0x600 | False | 0.3828125 | data | 2.9287747898985685 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x109000 | 0x964 | 0xa00 | False | 0.558203125 | data | 5.324624916894234 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
MUI | 0x108438 | 0xc8 | data | English | United States |
RT_VERSION | 0x1080b0 | 0x388 | data | English | United States |
DLL | Import |
---|---|
msvcrt.dll | memcpy, memcmp, _vsnprintf, _vsnwprintf, wcstok_s, memset, bsearch, time, memcpy_s, sprintf_s, _ultow_s, strcmp, __C_specific_handler, _initterm, malloc, free, _amsg_exit, _XcptFilter, wcscmp |
api-ms-win-core-libraryloader-l1-2-0.dll | GetProcAddress, GetModuleHandleW, DisableThreadLibraryCalls, GetModuleHandleExW, GetModuleFileNameW, FreeLibrary, LoadLibraryExW |
api-ms-win-core-synch-l1-2-0.dll | Sleep |
api-ms-win-core-profile-l1-1-0.dll | QueryPerformanceCounter |
api-ms-win-core-processthreads-l1-1-0.dll | GetCurrentThread, TlsSetValue, TlsAlloc, GetCurrentThreadId, SetThreadPriority, GetCurrentProcessId, GetThreadPriority, OpenProcessToken, TlsGetValue, TerminateProcess, GetCurrentProcess, OpenThreadToken, TlsFree |
api-ms-win-core-sysinfo-l1-1-0.dll | GetSystemTimeAsFileTime, GetTickCount, GetSystemInfo, GetComputerNameExW, GetSystemTime |
api-ms-win-core-rtlsupport-l1-1-0.dll | RtlLookupFunctionEntry, RtlCompareMemory, RtlCaptureContext, RtlVirtualUnwind |
api-ms-win-core-errorhandling-l1-1-0.dll | GetLastError, UnhandledExceptionFilter, SetLastError, SetUnhandledExceptionFilter |
ntdll.dll | RtlAllocateHeap, RtlValidRelativeSecurityDescriptor, RtlIpv6AddressToStringW, RtlIpv4AddressToStringW, RtlInitString, WinSqmEndSession, WinSqmStartSession, WinSqmSetDWORD, RtlLengthSecurityDescriptor, RtlIpv4AddressToStringA, RtlIpv6StringToAddressW, RtlApplicationVerifierStop, EtwEventEnabled, EtwEventWriteTransfer, EtwEventWrite, EtwEventActivityIdControl, EtwEventUnregister, EtwEventRegister, RtlNtStatusToDosError, EtwTraceMessage, RtlIpv4StringToAddressW, EtwUnregisterTraceGuids, RtlCreateHashTable, RtlDeleteHashTable, RtlInsertEntryHashTable, RtlRemoveEntryHashTable, RtlLookupEntryHashTable, RtlGetNextEntryHashTable, RtlInitEnumerationHashTable, RtlEnumerateEntryHashTable, RtlEndEnumerationHashTable, RtlExpandHashTable, RtlContractHashTable, RtlTimeToTimeFields, RtlIntegerToUnicodeString, RtlConvertSidToUnicodeString, RtlFreeUnicodeString, RtlAdjustPrivilege, RtlInitializeSListHead, RtlInterlockedPushEntrySList, RtlInterlockedPopEntrySList, EtwRegisterTraceGuidsW, EtwGetTraceEnableFlags, EtwGetTraceEnableLevel, EtwGetTraceLoggerHandle, RtlIpv6AddressToStringA |
AUTHZ.dll | AuthzFreeAuditEvent, AuthzAccessCheck, AuthziInitializeAuditParamsFromArray, AuthziFreeAuditEventType, AuthziInitializeAuditEvent, AuthziLogAuditEvent, AuthzInitializeResourceManager, AuthziInitializeAuditEventType, AuthzFreeResourceManager |
fwpuclnt.dll | FwpmEventProviderDestroy0, FwpmProviderContextUnsubscribeChanges0, FwpmFilterUnsubscribeChanges0, FwpsOpenToken0, IkeextGetConfigParameters0, IPsecKeyModuleAdd0, IPsecSaContextGetSpi1, FwpsQueryIPsecDosFWUsed0, FwpsQueryIPsecOffloadDone0, IPsecKeyModuleUpdateAcquire0, FwpmProviderContextSubscribeChanges0, FwpmFilterSubscribeChanges0, FwpmEventProviderCreate0, IPsecSaContextAddInboundAndTrackConnection, IPsecSaContextExpire0, FwppConnectionGetByIPsecInfo, FwpsLayerCreateInProcReplica0, FwpsLayerReleaseInProcReplica0, FwpsClassifyUser0, IPsecKeyNotification0, FwpmFilterGetById0, FwpmEngineClose0, IPsecSaContextAddOutboundAndTrackConnection, IPsecSaContextUpdate0, FwpmFilterCreateEnumHandle0, FwpmFilterEnum0, FwpmFilterDestroyEnumHandle0, FwppIPsecSaContextCreate, FwpmProviderContextGetByKey3, FwpmEngineOpen0, FwpmFilterAdd0, IPsecKeyModuleDelete0, IPsecGetKeyFromDictator0, FwpsAleExplicitCredentialsQuery0, FwpmEventProviderIsNetEventTypeEnabled0, IPsecKeyDictationCheck0, FwpmEventProviderFireNetEvent0, FwpmFreeMemory0 |
MSASN1.dll | ASN1_Decode, ASN1_CreateDecoder, ASN1_CloseDecoder, ASN1BERDecPeekTag, ASN1BERDecExplicitTag, ASN1DecSetError, ASN1_CreateModule, ASN1_FreeDecoded, ASN1Free, ASN1BERDecOpenType2, ASN1DecRealloc, ASN1BERDecEndOfContents, ASN1BERDecNotEndOfContents, ASN1_CloseModule |
api-ms-win-core-synch-l1-1-0.dll | InitializeCriticalSectionAndSpinCount, AcquireSRWLockExclusive, WaitForSingleObject, CreateEventA, ReleaseSemaphore, SetEvent, CreateSemaphoreExW, CreateEventW, ReleaseSRWLockExclusive, InitializeCriticalSection, TryEnterCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, TryAcquireSRWLockExclusive, InitializeSRWLock |
api-ms-win-core-handle-l1-1-0.dll | DuplicateHandle, CloseHandle |
api-ms-win-core-util-l1-1-0.dll | EncodePointer, DecodePointer |
api-ms-win-core-string-l1-1-0.dll | CompareStringEx, CompareStringW, WideCharToMultiByte |
api-ms-win-core-heap-l1-1-0.dll | GetProcessHeap, HeapReAlloc, HeapAlloc, HeapSize, HeapFree, HeapDestroy, HeapCreate |
api-ms-win-eventing-controller-l1-1-0.dll | ControlTraceW, StartTraceW |
api-ms-win-core-registry-l1-1-0.dll | RegEnumValueW, RegSetValueExW, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, RegQueryInfoKeyW, RegCreateKeyExW, RegNotifyChangeKeyValue |
api-ms-win-core-threadpool-l1-2-0.dll | CreateThreadpoolWait, CloseThreadpoolTimer, CreateThreadpool, SetThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolThreadMinimum, WaitForThreadpoolTimerCallbacks, CloseThreadpoolWait, CloseThreadpool, TrySubmitThreadpoolCallback, WaitForThreadpoolWaitCallbacks, SetThreadpoolWait, SetThreadpoolThreadMaximum |
api-ms-win-power-setting-l1-1-0.dll | PowerSettingRegisterNotification, PowerSettingUnregisterNotification |
api-ms-win-security-base-l1-1-0.dll | MapGenericMask, CreatePrivateObjectSecurityEx, ImpersonateLoggedOnUser, DuplicateToken, RevertToSelf, ImpersonateAnonymousToken, DestroyPrivateObjectSecurity, CopySid, GetLengthSid, EqualSid, GetPrivateObjectSecurity, GetTokenInformation, SetPrivateObjectSecurityEx |
api-ms-win-eventing-provider-l1-1-0.dll | EventSetInformation, EventRegister, EventWriteTransfer, EventUnregister |
api-ms-win-core-debug-l1-1-0.dll | DebugBreak, OutputDebugStringA |
WS2_32.dll | GetAddrInfoW, htonl, ntohl, ntohs, htons, FreeAddrInfoW, WSCEnumProtocols, WSASocketW, setsockopt, bind, closesocket, WSAIoctl, WSAEventSelect, WSAStartup, WSACleanup, WSASocketA, WSAGetLastError |
RPCRT4.dll | RpcServerInqBindings, RpcEpRegisterW, RpcEpUnregister, RpcImpersonateClient, MesEncodeDynBufferHandleCreate, MesHandleFree, I_RpcExceptionFilter, MesDecodeBufferHandleCreate, RpcServerUseProtseqW, RpcAsyncCompleteCall, NdrServerCall2, NdrMesTypeEncode3, NdrMesTypeDecode3, NdrMesTypeFree3, RpcBindingVectorFree, RpcServerUnregisterIfEx, RpcServerInqCallAttributesW, RpcRaiseException, RpcGetAuthorizationContextForClient, NdrAsyncServerCall, RpcFreeAuthorizationContext, NdrServerCallAll, Ndr64AsyncServerCallAll, RpcStringFreeW, UuidCreate, RpcRevertToSelf, RpcServerRegisterIfEx, UuidToStringW |
api-ms-win-core-heap-l2-1-0.dll | LocalFree, LocalAlloc |
api-ms-win-core-file-l1-1-0.dll | CompareFileTime |
api-ms-win-core-localization-l1-2-0.dll | FormatMessageW |
api-ms-win-core-timezone-l1-1-0.dll | SystemTimeToFileTime |
api-ms-win-core-threadpool-legacy-l1-1-0.dll | UnregisterWaitEx |
api-ms-win-core-threadpool-private-l1-1-0.dll | RegisterWaitForSingleObjectEx |
NSI.dll | NsiGetParameter, NsiSetParameter |
api-ms-win-core-perfcounters-l1-1-0.dll | PerfCreateInstance, PerfStartProvider, PerfSetCounterRefValue, PerfSetULongCounterValue, PerfSetCounterSetInfo, PerfStopProvider |
api-ms-win-security-activedirectoryclient-l1-1-0.dll | DsBindWithSpnExW, DsFreeNameResultW, DsCrackNamesW, DsUnBindW |
CRYPTSP.dll | CryptCreateHash, CryptGetHashParam, CryptDestroyHash, CryptReleaseContext, CryptHashData, CryptAcquireContextA |
UMPDC.dll | Pdcv2ActivationClientDeactivate, Pdcv2ActivationClientActivate, Pdcv2ActivationClientRenewActivation, Pdcv2ActivationClientUnregister, Pdcv2ActivationClientRegister |
api-ms-win-stateseparation-helpers-l1-1-0.dll | GetPersistedRegistryLocationW |
api-ms-win-core-apiquery-l1-1-0.dll | ApiSetQueryApiSetPresence |
api-ms-win-core-processthreads-l1-1-1.dll | GetProcessMitigationPolicy |
api-ms-win-core-delayload-l1-1-1.dll | ResolveDelayLoadedAPI |
api-ms-win-core-delayload-l1-1-0.dll | DelayLoadFailureHook |
Name | Ordinal | Address |
---|---|---|
IkeServiceMain | 1 | 0x18001bb60 |
SvchostPushServiceGlobals | 2 | 0x18002b530 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:27:00 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ff000000 |
File size: | 139776 bytes |
MD5 hash: | C676FC0263EDD17D4CE7D644B8F3FCD6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 1 |
Start time: | 11:27:00 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7fcd70000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 2 |
Start time: | 11:27:00 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff627730000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 3 |
Start time: | 11:27:00 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f45c0000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 4 |
Start time: | 11:27:00 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f45c0000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 5 |
Start time: | 11:27:03 |
Start date: | 28/01/2023 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f45c0000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |