DllRegisterServer
DllUnregisterServer
alterer
atabrine
citronwood
constantly
contrastment
councilor
demirelief
encurl
overbroaden
photoelastic
planispheral
preputial
tables
turbinella
vizarded
xylographic
Static task
static1
Behavioral task
behavioral1
Sample
totten.dat.dll
Resource
win7-20220812-en
Target
totten.dat.dll
Size
483KB
MD5
8181a8c772fa03a4375e3173f3a37405
SHA1
fa9094b16d6da6dccb99841515c338def0efdc7a
SHA256
ef713bf53131e16f35b94accbe2544e5b5969a417a6d2a37d880913635ded18d
SHA512
883ddf4851b5b2714b66ee0536ef35fccdecabeeb5b99782a0ee4674b3c09daa5c010d47c8997012a4de8e9e5eabfd121ba810c2639f03e6fa5b5aea0c90e916
SSDEEP
12288:mIQG2dEYsv2gJEXE1DMv9/rsGPDp7OAk4:9s0pMVtPD17
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
CreateDirectoryW
CreateFileA
CreateFileW
FileTimeToLocalFileTime
FindFirstFileW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameA
SetFileAttributesW
GetVolumeInformationA
SetUnhandledExceptionFilter
QueryPerformanceCounter
LeaveCriticalSection
ReleaseSemaphore
ReleaseMutex
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsFree
FlushInstructionCache
GetSystemInfo
GetLocalTime
GetVersion
GetTickCount
GetSystemDirectoryA
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualProtect
FindResourceExW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LoadResource
FindResourceW
LoadLibraryA
LoadLibraryW
GlobalAlloc
LocalUnlock
SetHandleCount
MulDiv
lstrcmpA
lstrcmpiA
lstrlenA
lstrlenW
FindResourceA
ExpandEnvironmentStringsW
WritePrivateProfileStringW
IsBadWritePtr
IsBadCodePtr
GetComputerNameA
GetComputerNameW
SystemTimeToFileTime
SetEndOfFile
WriteConsoleW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
MoveFileExW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
CloseHandle
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapAlloc
HeapFree
GetModuleFileNameW
GetModuleHandleExW
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsSetValue
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableW
SetStdHandle
GetStdHandle
VirtualAllocEx
VirtualAlloc
GetTickCount64
CreateThread
WaitForSingleObject
LocalFree
LocalAlloc
GetWindowsDirectoryA
ExitProcess
FindFirstFileA
FindNextFileA
EnumResourceLanguagesA
GetCommandLineA
SetLastError
GetLastError
InterlockedFlushSList
RtlUnwind
RaiseException
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
UnhandledExceptionFilter
EnterCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
SystemParametersInfoW
SystemParametersInfoA
CreateIconIndirect
LoadIconW
GetWindow
GetWindowThreadProcessId
GetTopWindow
FindWindowW
GetDesktopWindow
IntersectRect
SetRect
GetSysColor
MapWindowPoints
ScreenToClient
GetCursor
GetCursorPos
MessageBoxW
MessageBoxA
AdjustWindowRectEx
RedrawWindow
SetForegroundWindow
CreatePopupMenu
LoadMenuW
GetSystemMetrics
SetCapture
GetKeyState
CharUpperW
GetDlgCtrlID
GetNextDlgTabItem
DeferWindowPos
BeginDeferWindowPos
UnregisterClassW
GetDoubleClickTime
AttachThreadInput
SendMessageTimeoutW
SendMessageTimeoutA
RegisterWindowMessageA
FindWindowA
GetDC
EqualRect
SetWindowOrgEx
CreatePolygonRgn
GetStockObject
CreateSolidBrush
CreateRectRgn
CreateICA
CreateFontIndirectW
CreateDCW
CreateDCA
CreateBrushIndirect
CreateBitmap
GetEnhMetaFileW
RegCloseKey
CoInitializeEx
PathGetDriveNumberA
PathFindSuffixArrayA
PathFindOnPathA
PathFindExtensionA
PathFileExistsA
ord155
StrToIntA
PathAppendA
DllRegisterServer
DllUnregisterServer
alterer
atabrine
citronwood
constantly
contrastment
councilor
demirelief
encurl
overbroaden
photoelastic
planispheral
preputial
tables
turbinella
vizarded
xylographic
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ