Windows
Analysis Report
ctGrid.dll
Overview
General Information
Detection
Score: | 24 |
Range: | 0 - 100 |
Confidence: | 60% |
Signatures
Classification
- System is w10x64native
loaddll32.exe (PID: 4540 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\ctG rid.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618) conhost.exe (PID: 4360 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3272 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\ctG rid.dll",# 1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) rundll32.exe (PID: 1908 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\ctGr id.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679) regsvr32.exe (PID: 7592 cmdline:
regsvr32.e xe /s C:\U sers\user\ Desktop\ct Grid.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0) rundll32.exe (PID: 4384 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllC anUnloadNo w MD5: 889B99C52A60DD49227C5E485A016679) rundll32.exe (PID: 6728 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllG etClassObj ect MD5: 889B99C52A60DD49227C5E485A016679) WerFault.exe (PID: 2608 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 728 -s 620 MD5: 40A149513D721F096DDF50C04DA2F01F) rundll32.exe (PID: 4828 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ctGri d.dll,DllR egisterSer ver MD5: 889B99C52A60DD49227C5E485A016679)
- cleanup
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
Source: | Static PE information: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 1 Regsvr32 | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Rundll32 | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Virtualization/Sandbox Evasion | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Process Injection | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1675266 |
Start date and time: | 2025-04-27 03:05:14 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 35s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ctGrid.dll |
Detection: | SUS |
Classification: | sus24.winDLL@15/4@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, We rFault.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 20.42.65.92, 40.12 6.62.130 - Excluded domains from analysis
(whitelisted): onedsblobprdeu s17.eastus.cloudapp.azure.com, login.live.com, blobcollector .events.data.trafficmanager.ne t, umwatson.events.data.micros oft.com - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
21:07:28 | API Interceptor | |
21:07:31 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8619481584674419 |
Encrypted: | false |
SSDEEP: | 96:28BFKS6iIhVynsj94sF+wfFvXIxcQvc6QcEscw3G/a/z+HbHg/BQAS/YyNl4Efa8:7M3iIOnwmBUW4jeTfDu76wfAIO8dci |
MD5: | 45078E82D802836F25789F355597DAEF |
SHA1: | B9BE585A7CDFEAE5FF551EA75E433171CD6FB09D |
SHA-256: | 1DCE05C10B4218AC2FA570E73C978E6849749773E0C40027F403A7737FC8A9DA |
SHA-512: | 0278AA8074D623D021C64BF8176020DABA6D9114692D2ADF6A34FD916295746E32242A00BC9DE6CB92CA1A6A8D2B5B2960344168F318D16084984B11C72C4BBA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49934 |
Entropy (8bit): | 1.8130625352446805 |
Encrypted: | false |
SSDEEP: | 192:Lfpt/lXO5H4FNI4IPtMGOjvk2naUbHSJ:DptN+5HsNI4qxOjvkKyJ |
MD5: | 15121DB6F46922B7FD0F5523B0FFF027 |
SHA1: | 4D9C1B5387AEA6A2844B64D3DD31446C8B4FFB0C |
SHA-256: | 9E21030E94FDA9CF3A607ACC6EBE3896FAB5DCE9299057D750D48A6333A703F2 |
SHA-512: | 3D8B9A0EAE579FDEEAB03E224B3A0E7A4D885F18501240AAD20218F1A81C25820AF59CEFB1FEC71914DE126CED6C85B8A8B800874BAD65957BB8EA0C4F9D9930 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8244 |
Entropy (8bit): | 3.690758264330068 |
Encrypted: | false |
SSDEEP: | 192:R9l7lZNiuM6IQe56YPU6XgmfT5C/prO89bEWOsffw6Mm:R9lnNiN6IQY6Yc6XgmfT5eEWNffJ5 |
MD5: | 59243F2EC3F7CE77F37A9BBC18956EF9 |
SHA1: | 93BAE1D621C136B75ED19E15E60D0316A66D59AD |
SHA-256: | 86BC66A219209E9A11F48F66E27F6C4E66A1C01E5F79469FC1E0A3B039BE19D1 |
SHA-512: | B214A2E55E87AAEEF4F97F17A3DA1221F66C8AA90327901C67F778096DEA678F44F9AC3E46CD30027BA6378948B0072487BB5E969CFCBE3C202CFF216BCC3BA1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4795 |
Entropy (8bit): | 4.500001720861157 |
Encrypted: | false |
SSDEEP: | 48:cvIwwtl8zsZe702I7VFJ5WS2CfjkPgs3rm8M4JCdPs5FvW+q8/ESb5ZGScSFWd:uILfA7GySPf+JLCPCZJ3Ad |
MD5: | F7AF0431D9C80CF6930C5ED8147BE32B |
SHA1: | E238982F9DA7702C2249C09CD50D1E92BDEDDBDC |
SHA-256: | C8D2BCB12E9B91C85768284D126DA390B56E6E933E448BB2091C9ACB4B67E082 |
SHA-512: | 3F6B7BF9CEA32C89468ECA2DD93451CCB3722C4F886460FA0073671D9980398CCBF95142282AD4C25FCC3ECC8400607BCD7CE2784EAA4307FEBA651745F5082E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.186874316616049 |
TrID: |
|
File name: | ctGrid.dll |
File size: | 593'552 bytes |
MD5: | 038601a507d1b740da8a8a2a577ff72a |
SHA1: | c11932be2f3af0730cf934ab65e0bfe22e373a9c |
SHA256: | 0fbd08b76c1f436f733e76bd6a974062d71e5e9bc6ed103b7aa24996a0980eae |
SHA512: | fffe253b8134761e278758db08b94a27eeb55fbac3ba6c22e3eca25e8e00ef998cac001ae331a93381301b02f8c3f3e35a472f7cc711fd299aec49f3b1e84ab2 |
SSDEEP: | 6144:eRGaYcAsY58tME8aaKSISh0mx3vdhDPLVVuPAOp9cvH1SVxZ2n4XgDOwBD1TogHq:e7MdhbpMPAYw03G1fHMuTGMNIAAuny |
TLSH: | 25C45C51BD9601E6C70D263414EA333E7B7DAAD94F388F87A354EE3E2872191B836315 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e',..I...I...I..&B...I...Z...I.7$C...I...I...I...Z...I...B...I.K.G...I...C...I...M...I..%B...I..%M...I...H...I..'B...I...O...I |
Icon Hash: | 92a7aba5ab93d38a |
Entrypoint: | 0x1005b641 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL |
DLL Characteristics: | |
Time Stamp: | 0x3D471079 [Tue Jul 30 22:17:29 2002 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 002ac8523ac8c96b00990958b42f6781 |
Signature Valid: | false |
Signature Issuer: | CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US |
Signature Validation Error: | A certificate was explicitly revoked by its issuer |
Error Number: | -2146762484 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 24A200C10111A8890FCDEDDF15320496 |
Thumbprint SHA-1: | 1FDA42DC128D4B8AFE67959C226D4DEAE1532D27 |
Thumbprint SHA-256: | 1E532B65C1A33E101058C0747BE25F9B78E6BEFE400E2470C70CE5EC6B24DDF5 |
Serial: | 257079DAE8277574406525D6D95175B7 |
Instruction |
---|
push ebp |
mov ebp, esp |
push ebx |
mov ebx, dword ptr [ebp+08h] |
push esi |
mov esi, dword ptr [ebp+0Ch] |
push edi |
mov edi, dword ptr [ebp+10h] |
test esi, esi |
jne 00007FE330985C7Bh |
cmp dword ptr [100761ECh], 00000000h |
jmp 00007FE330985C98h |
cmp esi, 01h |
je 00007FE330985C77h |
cmp esi, 02h |
jne 00007FE330985C94h |
mov eax, dword ptr [10074A4Ch] |
test eax, eax |
je 00007FE330985C7Bh |
push edi |
push esi |
push ebx |
call eax |
test eax, eax |
je 00007FE330985C7Eh |
push edi |
push esi |
push ebx |
call 00007FE330985B8Ah |
test eax, eax |
jne 00007FE330985C76h |
xor eax, eax |
jmp 00007FE330985CC0h |
push edi |
push esi |
push ebx |
call 00007FE3309857DBh |
cmp esi, 01h |
mov dword ptr [ebp+0Ch], eax |
jne 00007FE330985C7Eh |
test eax, eax |
jne 00007FE330985CA9h |
push edi |
push eax |
push ebx |
call 00007FE330985B66h |
test esi, esi |
je 00007FE330985C77h |
cmp esi, 03h |
jne 00007FE330985C98h |
push edi |
push esi |
push ebx |
call 00007FE330985B55h |
test eax, eax |
jne 00007FE330985C75h |
and dword ptr [ebp+0Ch], eax |
cmp dword ptr [ebp+0Ch], 00000000h |
je 00007FE330985C83h |
mov eax, dword ptr [10074A4Ch] |
test eax, eax |
je 00007FE330985C7Ah |
push edi |
push esi |
push ebx |
call eax |
mov dword ptr [ebp+0Ch], eax |
mov eax, dword ptr [ebp+0Ch] |
pop edi |
pop esi |
pop ebx |
pop ebp |
retn 000Ch |
int3 |
int3 |
push FFFFFFFFh |
push eax |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov eax, dword ptr [esp+0Ch] |
mov dword ptr fs:[00000000h], esp |
mov dword ptr [esp+0Ch], ebp |
lea ebp, dword ptr [esp+0Ch] |
push eax |
ret |
int3 |
jmp dword ptr [1006281Ch] |
jmp dword ptr [00000040h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x71aa0 | 0xa3 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x709a8 | 0xc8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x77000 | 0x13870 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x90000 | 0xe90 | .reloc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x8b000 | 0x5df0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x62000 | 0x960 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x60de6 | 0x61000 | 8d7b128c22e17e02822a0d36a672b31c | False | 0.4664369563466495 | data | 6.397069157733135 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x62000 | 0xfb43 | 0x10000 | e08df169aae91191b595b24e6dd09d7d | False | 0.29486083984375 | data | 4.375421416506259 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x72000 | 0x420c | 0x3000 | 5a4aba5fe0b4826cacedc6f8e3c15b3b | False | 0.3429361979166667 | data | 4.733158304735189 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x77000 | 0x13870 | 0x14000 | 2a74df9392289d89b5321d30010279ef | False | 0.31199951171875 | data | 4.3552705263421 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x8b000 | 0x6ef4 | 0x7000 | a13e743e4468c5c1eac89d62b3e57c9a | False | 0.505615234375 | data | 6.006219877513674 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
TYPELIB | 0x7ef50 | 0xb680 | data | English | United States | 0.3535958904109589 |
RT_CURSOR | 0x7ecb0 | 0x134 | data | English | United States | 0.34415584415584416 |
RT_CURSOR | 0x7ee00 | 0x134 | data | English | United States | 0.37337662337662336 |
RT_BITMAP | 0x788a0 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120 | English | United States | 0.39285714285714285 |
RT_BITMAP | 0x78980 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.49038461538461536 |
RT_BITMAP | 0x78a50 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.5817307692307693 |
RT_BITMAP | 0x78b20 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.4519230769230769 |
RT_BITMAP | 0x78bf0 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.5048076923076923 |
RT_BITMAP | 0x78cc0 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.42788461538461536 |
RT_BITMAP | 0x78d90 | 0xd0 | Device independent bitmap graphic, 13 x 13 x 4, image size 104 | English | United States | 0.4855769230769231 |
RT_ICON | 0x77e68 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.17876344086021506 |
RT_ICON | 0x78150 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | English | United States | 0.38513513513513514 |
RT_ICON | 0x782a0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.42876344086021506 |
RT_ICON | 0x785a0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.3897849462365591 |
RT_DIALOG | 0x78e60 | 0x33e | data | English | United States | 0.4771084337349398 |
RT_DIALOG | 0x791a0 | 0x500 | data | English | United States | 0.38203125 |
RT_DIALOG | 0x796a0 | 0x2fa | data | English | United States | 0.46981627296587924 |
RT_DIALOG | 0x799a0 | 0x68a | data | English | United States | 0.3094384707287933 |
RT_DIALOG | 0x7a030 | 0x33a | data | English | United States | 0.39588377723970947 |
RT_DIALOG | 0x7a370 | 0x844 | data | English | United States | 0.3497164461247637 |
RT_DIALOG | 0x7abb8 | 0x55e | data | English | United States | 0.33260553129548764 |
RT_DIALOG | 0x7b118 | 0x616 | data | English | United States | 0.36777920410783055 |
RT_DIALOG | 0x7b730 | 0x47c | data | English | United States | 0.39285714285714285 |
RT_DIALOG | 0x7bbb0 | 0x97a | data | English | United States | 0.3281121187139324 |
RT_DIALOG | 0x7c530 | 0x66c | data | English | United States | 0.3150851581508516 |
RT_DIALOG | 0x7cba0 | 0x428 | data | English | United States | 0.35714285714285715 |
RT_DIALOG | 0x7cfc8 | 0x12e | data | English | United States | 0.6158940397350994 |
RT_DIALOG | 0x7d720 | 0x658 | data | English | United States | 0.416871921182266 |
RT_DIALOG | 0x7d0f8 | 0x8a | data | English | United States | 0.8043478260869565 |
RT_DIALOG | 0x7d188 | 0x86 | data | English | United States | 0.7985074626865671 |
RT_DIALOG | 0x7d210 | 0x50c | data | English | United States | 0.4434984520123839 |
RT_DIALOG | 0x7dd78 | 0x1b6 | data | English | United States | 0.5707762557077626 |
RT_STRING | 0x8a5d0 | 0x6c | Targa image data 105 x 100 x 32 +71 +114 | English | United States | 0.6111111111111112 |
RT_STRING | 0x8a640 | 0xac | Matlab v4 mat-file (little endian) e, numeric, rows 0, columns 0 | English | United States | 0.4186046511627907 |
RT_STRING | 0x8a6f0 | 0x154 | data | English | United States | 0.38529411764705884 |
RT_STRING | 0x8a848 | 0x28 | data | English | United States | 0.45 |
RT_GROUP_CURSOR | 0x7ede8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x7ef38 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x78278 | 0x22 | data | English | United States | 1.0 |
RT_GROUP_ICON | 0x78588 | 0x14 | data | English | United States | 1.25 |
RT_GROUP_ICON | 0x78888 | 0x14 | data | English | United States | 1.2 |
RT_VERSION | 0x77a70 | 0x3f4 | data | English | United States | 0.4298418972332016 |
None | 0x7e148 | 0x317 | data | English | United States | 0.48419721871049304 |
None | 0x7df30 | 0x217 | Targa image data - Mono 25932 x 29798 x 32 +8240 +8237 - 10-bit alpha - interleave "ustify" | English | United States | 0.3981308411214953 |
None | 0x7e988 | 0xb1 | data | English | United States | 0.5988700564971752 |
None | 0x7e460 | 0x2a6 | data | English | United States | 0.40412979351032446 |
None | 0x7e708 | 0x1e9 | data | English | United States | 0.4110429447852761 |
None | 0x7e8f8 | 0x8e | Targa image data - Mono (4356-0) 25932 x 29798 x 32 +8240 +8237 - 10-bit alpha - interleave "ustify" | English | United States | 0.5070422535211268 |
None | 0x7ea40 | 0x21b | data | English | United States | 0.49907235621521334 |
None | 0x7ec60 | 0x4b | data | English | United States | 0.8266666666666667 |
DLL | Import |
---|---|
MFC42.DLL | |
MSVCRT.dll | _wsplitpath, _mbsnbcpy, _mbsicmp, localtime, _ftol, sprintf, _mbscmp, _CxxThrowException, atol, __dllonexit, __CxxFrameHandler, time, atof, wcsncpy, wcslen, toupper, isalpha, _onexit, ??1type_info@@UAE@XZ, _except_handler3, ?terminate@@YAXXZ, free, _initterm, malloc, _adjust_fdiv |
KERNEL32.dll | GlobalAlloc, GlobalLock, IsDBCSLeadByte, GlobalFree, InterlockedIncrement, GlobalUnlock, lstrlenA, LocalAlloc, FormatMessageA, GetLastError, MultiByteToWideChar, WideCharToMultiByte, LocalFree, InterlockedDecrement |
USER32.dll | MessageBoxA, IsWindowVisible, PeekMessageA, MessageBeep, LoadBitmapA, DrawFocusRect, SetRectEmpty, SetScrollPos, SetScrollRange, GetScrollRange, GetFocus, TranslateMessage, DispatchMessageA, GetWindowRect, PtInRect, LoadCursorA, SetCursor, EnableWindow, GetScrollPos, GetSysColor, wsprintfA, GetKeyState, FillRect, SendMessageA, GetDC, ReleaseDC, ReleaseCapture, GetSystemMetrics, SetCapture, SetTimer, ScreenToClient, InvalidateRect, KillTimer, GetClientRect, GetCursorPos, FindWindowA, WindowFromPoint, CopyRect, UpdateWindow, GetCapture, InflateRect, GetParent, PostMessageA |
GDI32.dll | DeleteObject, SelectObject, CreateFontIndirectA, Polygon, Rectangle, GetObjectA, CreatePen, CreateSolidBrush, CreatePatternBrush, SetPixel, CreateCompatibleBitmap, CreateCompatibleDC, Ellipse, Polyline, Arc, BitBlt, StretchBlt, CreateBitmap, DeleteDC, EndDoc, EndPage, StartPage, StartDocA, SetAbortProc, GetDeviceCaps |
SHELL32.dll | ShellExecuteA |
ole32.dll | OleRun, CoCreateInstance, CreateStreamOnHGlobal |
OLEPRO32.DLL | |
OLEAUT32.dll | SysAllocString, SysStringByteLen, SysAllocStringByteLen, SysFreeString, VariantInit, VariantCopy, VariantClear, VariantChangeType, SysStringLen, LoadRegTypeLib, GetErrorInfo |
Name | Ordinal | Address |
---|---|---|
DllCanUnloadNow | 1 | 0x1005ba2e |
DllGetClassObject | 2 | 0x1005ba00 |
DllRegisterServer | 3 | 0x10022930 |
DllUnregisterServer | 4 | 0x10022ac0 |
Description | Data |
---|---|
Comments | |
CompanyName | DBI Technologies Inc. |
FileDescription | ctGrid ActiveX Control Module |
FileVersion | 2, 0, 1, 0 |
InternalName | ctGrid |
LegalCopyright | Copyright (C) 2002 DBI Technologies Inc. |
LegalTrademarks | |
OLESelfRegister | $$ |
OriginalFilename | ctGrid.OCX |
PrivateBuild | |
ProductName | ctGrid ActiveX Control Module |
ProductVersion | 2, 0, 1, 0 |
SpecialBuild | |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x930000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7180f0000 |
File size: | 875'008 bytes |
MD5 hash: | 81CA40085FC75BABD2C91D18AA9FFA68 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbc0000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\regsvr32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xce0000 |
File size: | 20'992 bytes |
MD5 hash: | 878E47C8656E53AE8A8A21E927C6F7E0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 21:07:22 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 21:07:25 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 21:07:25 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x770000 |
File size: | 482'640 bytes |
MD5 hash: | 40A149513D721F096DDF50C04DA2F01F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 21:07:28 |
Start date: | 26/04/2025 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd40000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |