DllCanUnload
frDocConst
frDocStart
frDocTitle
frGenProc
frInitF
frRateDoc
frTrend1
frTrendH
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Cidox.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Cidox.dll
Resource
win10v2004-20220901-en
Target
Trojan-Ransom.Win32.Cidox.add-c1457b2cfa7aa008dc0c08325aa2068cd34958985a7b98429b96fc8da12e6a57
Size
48KB
MD5
32f78eb25e77b081f6e2de5bef9f99e3
SHA1
4416197f816f0e5ef4339132ab55083e8de7b642
SHA256
c1457b2cfa7aa008dc0c08325aa2068cd34958985a7b98429b96fc8da12e6a57
SHA512
c9fddfc7fec26415d5f12bed378889f95662f925bb2b9989dbbed94f09fb2416e6660ff1e50c9de5252dd56d26f2cc47c45fb9ac73c697a098ff246437eedcdc
SSDEEP
768:Q7sFHtIe/g7s0/esABtyvmVUTE/UKKsKTIM9RGStZyIXRXo98:VF2eIY0/Ky+V6EMKBKsMuA1o
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualFree
VirtualAlloc
lstrcmpiA
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LockResource
LoadResource
CloseHandle
GetCommandLineA
GetStringTypeW
GetStringTypeA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
RtlUnwind
GetForegroundWindow
DllCanUnload
frDocConst
frDocStart
frDocTitle
frGenProc
frInitF
frRateDoc
frTrend1
frTrendH
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ