DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ReplayRecovery.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ReplayRecovery.dll
Resource
win10v2004-20221111-en
Target
ReplayRecovery.dll
Size
416KB
MD5
0aa5d19dd6da7e3e8e78f12e76018cd7
SHA1
4f1a164c540f4747bd8068da370ffae2adeff438
SHA256
8ed2b6246f15f50d547efbf3b65f90e88f2a4505e47bf9162ffba8e3284afc92
SHA512
0c2fc9af089198f5a0553f66e4f96493ad59937ab044a03d4e5388eac41d1c2bfcf676a2379b8275db2dd493ff2cecc9c027e8fbb4619ba491c8b8c33d61b33d
SSDEEP
6144:Wr+GJfKh/0qn0u4I0YXyibNyZ5YK/39wYCi6qgrasYXAIW0iLnJvZ:WdJfKhcXu5bRKZCxWOZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InjectCrashNotifier
SetCrashNotifyPort
PathIsRelativeW
PathAppendW
DisableThreadLibraryCalls
Sleep
InterlockedIncrement
InterlockedDecrement
RaiseException
FreeLibrary
LoadLibraryExW
FormatMessageW
lstrcpyW
GetCurrentThreadId
QueryPerformanceCounter
ExitProcess
GetProcessHeap
HeapSize
GetCurrentProcess
HeapFree
HeapAlloc
DeleteCriticalSection
GetVersionExA
LocalFree
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapReAlloc
GetModuleFileNameW
FindResourceExW
DuplicateHandle
TerminateProcess
FindResourceW
LoadResource
LockResource
SizeofResource
GetUserDefaultLCID
lstrlenA
MultiByteToWideChar
lstrlenW
GetLastError
GetCurrentProcessId
OpenProcess
CloseHandle
GetTickCount
GetExitCodeProcess
CreateToolhelp32Snapshot
Process32FirstW
HeapDestroy
Process32NextW
UnregisterClassW
DestroyWindow
GetWindowLongW
GetParent
GetForegroundWindow
SendMessageTimeoutW
SetForegroundWindow
SystemParametersInfoW
ExitWindowsEx
GetWindowTextLengthW
GetWindowTextW
GetKeyboardState
ToAscii
MapVirtualKeyW
SendInput
LoadStringW
RegisterWindowMessageW
RegisterClipboardFormatW
RegisterClassW
CreateWindowExW
EnumWindows
DefWindowProcW
IsWindowVisible
GetWindowThreadProcessId
OpenProcessToken
LookupPrivilegeValueW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
AdjustTokenPrivileges
StgCreateDocfile
CoCreateInstance
CLSIDFromProgID
OleLoadFromStream
WriteClassStm
CoDisconnectObject
CoTaskMemFree
StringFromCLSID
OleSaveToStream
StgOpenStorage
SysReAllocStringLen
LoadTypeLi
LoadRegTypeLi
DispCallFunc
RegisterTypeLi
SafeArrayGetIID
VariantCopy
VarCmp
VarBstrCmp
VarBstrCat
SafeArrayRedim
SafeArrayCopy
SafeArrayAllocData
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SafeArrayUnlock
SafeArrayLock
VariantChangeType
SafeArrayDestroy
SafeArrayGetVartype
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayCreateVectorEx
SafeArrayPutElement
SysAllocStringLen
SysStringLen
VariantClear
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
GetErrorInfo
SafeArrayAllocDescriptor
ord30
ord31
ord15
ord32
ord18
ord22
ord64
ord55
ord49
ord56
ord23
ord61
ord58
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Nomemory@std@@YAXXZ
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
??3@YAXPAX@Z
_CxxThrowException
??0exception@@QAE@ABV0@@Z
realloc
_purecall
malloc
_resetstkoflw
_except_handler3
wcslen
??_V@YAXPAX@Z
memmove
islower
wcsrchr
wcsstr
_itow
swprintf
_wtoi
_wcsicmp
wcstoul
wcschr
wcscpy
wcscat
wcscmp
vswprintf
iswdigit
memset
_callnewh
__security_error_handler
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
__CppXcptFilter
free
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ