Report - adobe-explorer.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2023.07.21 13:04 Machine s1_win7_x6401
Filename adobe-explorer.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
6.2
ZERO API
VT API (file) 14 detected (GenericKD, Artemis, Parallax, W3L1QB, Sonbokli, ai score=86, F0D1C00GK23, Malicious, Behavior)
md5 f6637dd80c1bf55fdf7d31f1d857a155
sha256 930ed2eef19f9a8fe45fc227cefc8d7369ef251c489b592d1f060f506d68bbba
ssdeep 49152:Ayr13C8ZAInUxXaqHBkuluNH3iYGnFDB9KYl+NVoQ8ngkfWEGWDv3XPjVAjknL2Z:717ZAIwXaqHJluNH3iY+DL6NVX8ngkf6
imphash a963c386a78baa23fe81830ed26b85d5
impfuzzy 192:smxdRF0GXuUUYxfBS6MQyQYbkM+kRcYcRcV40ZNb5K/VPNPrP:smxdbD+YPtIk+9Edib5cVPNPrP
  Network IP location

Signature (14cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to remove evidence of file being downloaded from the Internet
watch File has been identified by 14 AntiVirus engines on VirusTotal as malicious
watch Potential code injection by writing to the memory of another process
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
texasgrudgecompany.com MD IP Volume inc 5.8.18.42
5.8.18.42 MD IP Volume inc 5.8.18.42

Suricata ids

PE API

IAT(Import Address Table) Library

VERSION.dll
 0x51b838 VerQueryValueW
 0x51b83c GetFileVersionInfoW
 0x51b840 GetFileVersionInfoSizeW
KERNEL32.dll
 0x51b1d4 GetConsoleMode
 0x51b1d8 WriteConsoleW
 0x51b1dc SetEnvironmentVariableA
 0x51b1e0 MultiByteToWideChar
 0x51b1e4 GetModuleHandleW
 0x51b1e8 GetProcAddress
 0x51b1ec CreateSemaphoreW
 0x51b1f0 GetCommandLineW
 0x51b1f4 CreateProcessW
 0x51b1f8 WaitForSingleObject
 0x51b1fc Sleep
 0x51b200 CloseHandle
 0x51b204 GetLastError
 0x51b208 FindResourceW
 0x51b20c LoadResource
 0x51b210 SizeofResource
 0x51b214 LockResource
 0x51b218 lstrlenW
 0x51b21c lstrcmpW
 0x51b220 FreeLibrary
 0x51b224 SetLastError
 0x51b228 DeactivateActCtx
 0x51b22c ActivateActCtx
 0x51b230 LoadLibraryW
 0x51b234 InitializeCriticalSectionAndSpinCount
 0x51b238 DeleteCriticalSection
 0x51b23c EnterCriticalSection
 0x51b240 LeaveCriticalSection
 0x51b244 CompareStringW
 0x51b248 GetVersionExW
 0x51b24c GlobalDeleteAtom
 0x51b250 GetConsoleCP
 0x51b254 GlobalAddAtomW
 0x51b258 GetCurrentThreadId
 0x51b25c FreeResource
 0x51b260 MulDiv
 0x51b264 GlobalUnlock
 0x51b268 GlobalLock
 0x51b26c GetModuleFileNameW
 0x51b270 GetCurrentProcessId
 0x51b274 LocalFree
 0x51b278 FormatMessageW
 0x51b27c IsProcessorFeaturePresent
 0x51b280 IsValidCodePage
 0x51b284 GetOEMCP
 0x51b288 GetACP
 0x51b28c GetCPInfo
 0x51b290 IsDebuggerPresent
 0x51b294 UnhandledExceptionFilter
 0x51b298 TerminateProcess
 0x51b29c QueryPerformanceCounter
 0x51b2a0 HeapCreate
 0x51b2a4 SetHandleCount
 0x51b2a8 GetEnvironmentStringsW
 0x51b2ac FreeEnvironmentStringsW
 0x51b2b0 GetStdHandle
 0x51b2b4 SetUnhandledExceptionFilter
 0x51b2b8 GetFileType
 0x51b2bc SetStdHandle
 0x51b2c0 HeapSize
 0x51b2c4 HeapQueryInformation
 0x51b2c8 CreateThread
 0x51b2cc ExitThread
 0x51b2d0 VirtualQuery
 0x51b2d4 GetSystemInfo
 0x51b2d8 VirtualAlloc
 0x51b2dc GlobalAlloc
 0x51b2e0 LCMapStringW
 0x51b2e4 GetTimeZoneInformation
 0x51b2e8 GlobalFindAtomW
 0x51b2ec GetStringTypeW
 0x51b2f0 ExitProcess
 0x51b2f4 HeapReAlloc
 0x51b2f8 GlobalSize
 0x51b2fc CopyFileW
 0x51b300 GlobalFree
 0x51b304 RaiseException
 0x51b308 RtlUnwind
 0x51b30c HeapFree
 0x51b310 HeapAlloc
 0x51b314 GetSystemTimeAsFileTime
 0x51b318 DecodePointer
 0x51b31c EncodePointer
 0x51b320 GetStartupInfoW
 0x51b324 HeapSetInformation
 0x51b328 FindResourceExW
 0x51b32c VirtualProtect
 0x51b330 SearchPathW
 0x51b334 GetProfileIntW
 0x51b338 GetTickCount
 0x51b33c SetErrorMode
 0x51b340 GetNumberFormatW
 0x51b344 GetWindowsDirectoryW
 0x51b348 GetTempPathW
 0x51b34c GetTempFileNameW
 0x51b350 GetFileTime
 0x51b354 GetFileSizeEx
 0x51b358 GetFileAttributesW
 0x51b35c FileTimeToLocalFileTime
 0x51b360 GetFileAttributesExW
 0x51b364 GetFullPathNameW
 0x51b368 GetVolumeInformationW
 0x51b36c FindFirstFileW
 0x51b370 FindClose
 0x51b374 GetCurrentProcess
 0x51b378 DuplicateHandle
 0x51b37c GetFileSize
 0x51b380 SetEndOfFile
 0x51b384 UnlockFile
 0x51b388 LockFile
 0x51b38c FlushFileBuffers
 0x51b390 SetFilePointer
 0x51b394 WriteFile
 0x51b398 ReadFile
 0x51b39c CreateFileW
 0x51b3a0 lstrcmpiW
 0x51b3a4 DeleteFileW
 0x51b3a8 GetCurrentDirectoryW
 0x51b3ac FileTimeToSystemTime
 0x51b3b0 GetSystemDirectoryW
 0x51b3b4 GlobalGetAtomNameW
 0x51b3b8 lstrlenA
 0x51b3bc InterlockedIncrement
 0x51b3c0 GlobalFlags
 0x51b3c4 TlsFree
 0x51b3c8 LocalReAlloc
 0x51b3cc TlsSetValue
 0x51b3d0 TlsAlloc
 0x51b3d4 InitializeCriticalSection
 0x51b3d8 GlobalHandle
 0x51b3dc GlobalReAlloc
 0x51b3e0 TlsGetValue
 0x51b3e4 LocalAlloc
 0x51b3e8 WideCharToMultiByte
 0x51b3ec ResumeThread
 0x51b3f0 SetThreadPriority
 0x51b3f4 GetPrivateProfileStringW
 0x51b3f8 WritePrivateProfileStringW
 0x51b3fc GetPrivateProfileIntW
 0x51b400 lstrcpyW
 0x51b404 lstrcmpA
 0x51b408 GetCurrentThread
 0x51b40c GetUserDefaultUILanguage
 0x51b410 ConvertDefaultLocale
 0x51b414 GetSystemDefaultUILanguage
 0x51b418 CompareStringA
 0x51b41c GetLocaleInfoW
 0x51b420 LoadLibraryExW
 0x51b424 InterlockedExchange
 0x51b428 InterlockedDecrement
 0x51b42c ReleaseActCtx
 0x51b430 CreateActCtxW
USER32.dll
 0x51b4c4 IsClipboardFormatAvailable
 0x51b4c8 SetMenuDefaultItem
 0x51b4cc PostThreadMessageW
 0x51b4d0 CreateMenu
 0x51b4d4 IsMenu
 0x51b4d8 UpdateLayeredWindow
 0x51b4dc UnionRect
 0x51b4e0 MonitorFromPoint
 0x51b4e4 TranslateMDISysAccel
 0x51b4e8 DrawMenuBar
 0x51b4ec DefMDIChildProcW
 0x51b4f0 DefFrameProcW
 0x51b4f4 CreateDialogIndirectParamW
 0x51b4f8 EndDialog
 0x51b4fc RegisterClipboardFormatW
 0x51b500 UnpackDDElParam
 0x51b504 ReuseDDElParam
 0x51b508 InsertMenuItemW
 0x51b50c TranslateAcceleratorW
 0x51b510 GetIconInfo
 0x51b514 EnableScrollBar
 0x51b518 HideCaret
 0x51b51c InvertRect
 0x51b520 GetMenuDefaultItem
 0x51b524 LockWindowUpdate
 0x51b528 BringWindowToTop
 0x51b52c SetCursorPos
 0x51b530 CreateAcceleratorTableW
 0x51b534 LoadAcceleratorsW
 0x51b538 GetKeyboardState
 0x51b53c GetKeyboardLayout
 0x51b540 MapVirtualKeyW
 0x51b544 ToUnicodeEx
 0x51b548 DrawFocusRect
 0x51b54c DrawFrameControl
 0x51b550 DrawEdge
 0x51b554 DrawIconEx
 0x51b558 DrawStateW
 0x51b55c GetSystemMenu
 0x51b560 LoadMenuW
 0x51b564 SetClassLongW
 0x51b568 GetAsyncKeyState
 0x51b56c NotifyWinEvent
 0x51b570 CreatePopupMenu
 0x51b574 DestroyAcceleratorTable
 0x51b578 SetParent
 0x51b57c IsZoomed
 0x51b580 DestroyIcon
 0x51b584 IsIconic
 0x51b588 MessageBeep
 0x51b58c GetNextDlgTabItem
 0x51b590 GetNextDlgGroupItem
 0x51b594 IsRectEmpty
 0x51b598 CopyAcceleratorTableW
 0x51b59c OffsetRect
 0x51b5a0 CharUpperW
 0x51b5a4 ReleaseCapture
 0x51b5a8 WindowFromPoint
 0x51b5ac SetCapture
 0x51b5b0 InvalidateRect
 0x51b5b4 DeleteMenu
 0x51b5b8 UnregisterClassW
 0x51b5bc EnumDisplayMonitors
 0x51b5c0 SetRectEmpty
 0x51b5c4 CopyImage
 0x51b5c8 GetDesktopWindow
 0x51b5cc RealChildWindowFromPoint
 0x51b5d0 SystemParametersInfoW
 0x51b5d4 DestroyMenu
 0x51b5d8 GetMenuItemInfoW
 0x51b5dc ShowOwnedPopups
 0x51b5e0 SetCursor
 0x51b5e4 GetMessageW
 0x51b5e8 TranslateMessage
 0x51b5ec GetActiveWindow
 0x51b5f0 GetCursorPos
 0x51b5f4 MapDialogRect
 0x51b5f8 WaitMessage
 0x51b5fc PostQuitMessage
 0x51b600 SetMenuItemBitmaps
 0x51b604 GetMenuCheckMarkDimensions
 0x51b608 ModifyMenuW
 0x51b60c CheckMenuItem
 0x51b610 IntersectRect
 0x51b614 InflateRect
 0x51b618 GetMenuState
 0x51b61c GetMenuStringW
 0x51b620 AppendMenuW
 0x51b624 InsertMenuW
 0x51b628 RemoveMenu
 0x51b62c GetWindowThreadProcessId
 0x51b630 EndPaint
 0x51b634 BeginPaint
 0x51b638 GetWindowDC
 0x51b63c ReleaseDC
 0x51b640 ClientToScreen
 0x51b644 GrayStringW
 0x51b648 DrawTextExW
 0x51b64c DrawTextW
 0x51b650 TabbedTextOutW
 0x51b654 FillRect
 0x51b658 RegisterWindowMessageW
 0x51b65c LoadIconW
 0x51b660 SendDlgItemMessageA
 0x51b664 WinHelpW
 0x51b668 IsChild
 0x51b66c GetCapture
 0x51b670 SetWindowsHookExW
 0x51b674 CallNextHookEx
 0x51b678 GetClassLongW
 0x51b67c GetClassNameW
 0x51b680 SetPropW
 0x51b684 GetPropW
 0x51b688 RemovePropW
 0x51b68c GetForegroundWindow
 0x51b690 GetLastActivePopup
 0x51b694 SetActiveWindow
 0x51b698 DispatchMessageW
 0x51b69c BeginDeferWindowPos
 0x51b6a0 EndDeferWindowPos
 0x51b6a4 GetTopWindow
 0x51b6a8 DestroyWindow
 0x51b6ac UnhookWindowsHookEx
 0x51b6b0 GetMessageTime
 0x51b6b4 GetMessagePos
 0x51b6b8 PeekMessageW
 0x51b6bc MonitorFromWindow
 0x51b6c0 GetMonitorInfoW
 0x51b6c4 MapWindowPoints
 0x51b6c8 ScrollWindow
 0x51b6cc TrackPopupMenu
 0x51b6d0 GetKeyState
 0x51b6d4 SetMenu
 0x51b6d8 SetScrollRange
 0x51b6dc GetScrollRange
 0x51b6e0 SetScrollPos
 0x51b6e4 GetScrollPos
 0x51b6e8 SetForegroundWindow
 0x51b6ec ShowScrollBar
 0x51b6f0 IsWindowVisible
 0x51b6f4 ValidateRect
 0x51b6f8 UpdateWindow
 0x51b6fc GetClientRect
 0x51b700 PostMessageW
 0x51b704 GetSubMenu
 0x51b708 GetMenuItemID
 0x51b70c GetMenuItemCount
 0x51b710 CreateWindowExW
 0x51b714 GetClassInfoExW
 0x51b718 GetClassInfoW
 0x51b71c RegisterClassW
 0x51b720 GetSysColor
 0x51b724 AdjustWindowRectEx
 0x51b728 ScreenToClient
 0x51b72c EqualRect
 0x51b730 DeferWindowPos
 0x51b734 GetScrollInfo
 0x51b738 SetScrollInfo
 0x51b73c GetWindowRgn
 0x51b740 DestroyCursor
 0x51b744 DrawIcon
 0x51b748 SubtractRect
 0x51b74c MapVirtualKeyExW
 0x51b750 GetKeyNameTextW
 0x51b754 IsCharLowerW
 0x51b758 GetDoubleClickTime
 0x51b75c CharUpperBuffW
 0x51b760 SetWindowPlacement
 0x51b764 GetWindowPlacement
 0x51b768 DefWindowProcW
 0x51b76c CallWindowProcW
 0x51b770 GetMenu
 0x51b774 CopyRect
 0x51b778 PtInRect
 0x51b77c GetWindowTextLengthW
 0x51b780 GetWindowTextW
 0x51b784 GetFocus
 0x51b788 SetFocus
 0x51b78c CopyIcon
 0x51b790 EmptyClipboard
 0x51b794 CloseClipboard
 0x51b798 FrameRect
 0x51b79c OpenClipboard
 0x51b7a0 EnableMenuItem
 0x51b7a4 GetUpdateRect
 0x51b7a8 SetWindowPos
 0x51b7ac GetParent
 0x51b7b0 SendMessageW
 0x51b7b4 IsWindowEnabled
 0x51b7b8 ShowWindow
 0x51b7bc MoveWindow
 0x51b7c0 SetWindowLongW
 0x51b7c4 GetDlgCtrlID
 0x51b7c8 IsWindow
 0x51b7cc SetWindowTextW
 0x51b7d0 GetWindowLongW
 0x51b7d4 IsDialogMessageW
 0x51b7d8 SendDlgItemMessageW
 0x51b7dc GetDlgItem
 0x51b7e0 CheckDlgButton
 0x51b7e4 GetWindow
 0x51b7e8 MessageBoxW
 0x51b7ec wsprintfW
 0x51b7f0 LoadStringW
 0x51b7f4 EnableWindow
 0x51b7f8 KillTimer
 0x51b7fc GetDC
 0x51b800 SetTimer
 0x51b804 RedrawWindow
 0x51b808 LoadImageW
 0x51b80c SetWindowRgn
 0x51b810 GetWindowRect
 0x51b814 GetSystemMetrics
 0x51b818 LoadBitmapW
 0x51b81c RegisterClassExW
 0x51b820 GetSysColorBrush
 0x51b824 LoadCursorW
 0x51b828 SetRect
 0x51b82c SetLayeredWindowAttributes
 0x51b830 SetClipboardData
GDI32.dll
 0x51b040 GetLayout
 0x51b044 SetLayout
 0x51b048 SelectClipRgn
 0x51b04c GetViewportExtEx
 0x51b050 GetWindowExtEx
 0x51b054 PtVisible
 0x51b058 RectVisible
 0x51b05c TextOutW
 0x51b060 ExtTextOutW
 0x51b064 Escape
 0x51b068 SetViewportOrgEx
 0x51b06c OffsetViewportOrgEx
 0x51b070 SetViewportExtEx
 0x51b074 ScaleViewportExtEx
 0x51b078 SetWindowOrgEx
 0x51b07c OffsetWindowOrgEx
 0x51b080 SetWindowExtEx
 0x51b084 ScaleWindowExtEx
 0x51b088 ExtSelectClipRgn
 0x51b08c DeleteDC
 0x51b090 CreatePatternBrush
 0x51b094 CreateBitmap
 0x51b098 SelectPalette
 0x51b09c GetObjectType
 0x51b0a0 GetDeviceCaps
 0x51b0a4 CreatePen
 0x51b0a8 CreateSolidBrush
 0x51b0ac CreateHatchBrush
 0x51b0b0 CopyMetaFileW
 0x51b0b4 CreateDCW
 0x51b0b8 CreateRectRgnIndirect
 0x51b0bc SetRectRgn
 0x51b0c0 PatBlt
 0x51b0c4 DPtoLP
 0x51b0c8 GetTextExtentPoint32W
 0x51b0cc CreateDIBitmap
 0x51b0d0 SetTextAlign
 0x51b0d4 GetTextMetricsW
 0x51b0d8 EnumFontFamiliesW
 0x51b0dc GetTextCharsetInfo
 0x51b0e0 GetBkColor
 0x51b0e4 GetTextColor
 0x51b0e8 GetRgnBox
 0x51b0ec CreateDIBSection
 0x51b0f0 CreateRoundRectRgn
 0x51b0f4 CreatePolygonRgn
 0x51b0f8 CreateEllipticRgn
 0x51b0fc Polyline
 0x51b100 Ellipse
 0x51b104 Polygon
 0x51b108 CreatePalette
 0x51b10c GetPaletteEntries
 0x51b110 GetNearestPaletteIndex
 0x51b114 RealizePalette
 0x51b118 GetSystemPaletteEntries
 0x51b11c OffsetRgn
 0x51b120 SetDIBColorTable
 0x51b124 StretchBlt
 0x51b128 SetPixel
 0x51b12c Rectangle
 0x51b130 EnumFontFamiliesExW
 0x51b134 LPtoDP
 0x51b138 GetWindowOrgEx
 0x51b13c GetViewportOrgEx
 0x51b140 PtInRegion
 0x51b144 FillRgn
 0x51b148 FrameRgn
 0x51b14c GetBoundsRect
 0x51b150 ExtFloodFill
 0x51b154 SetPaletteEntries
 0x51b158 GetTextFaceW
 0x51b15c SetPixelV
 0x51b160 LineTo
 0x51b164 MoveToEx
 0x51b168 IntersectClipRect
 0x51b16c ExcludeClipRect
 0x51b170 GetClipBox
 0x51b174 SetMapMode
 0x51b178 SetROP2
 0x51b17c SetPolyFillMode
 0x51b180 SetBkMode
 0x51b184 RestoreDC
 0x51b188 SaveDC
 0x51b18c SetBkColor
 0x51b190 SetTextColor
 0x51b194 BitBlt
 0x51b198 DeleteObject
 0x51b19c CombineRgn
 0x51b1a0 CreateRectRgn
 0x51b1a4 GetPixel
 0x51b1a8 SelectObject
 0x51b1ac CreateCompatibleDC
 0x51b1b0 GetStockObject
 0x51b1b4 CreateCompatibleBitmap
 0x51b1b8 GetObjectW
 0x51b1bc CreateFontIndirectW
MSIMG32.dll
 0x51b438 AlphaBlend
 0x51b43c TransparentBlt
COMDLG32.dll
 0x51b038 GetFileTitleW
WINSPOOL.DRV
 0x51b850 ClosePrinter
 0x51b854 OpenPrinterW
 0x51b858 DocumentPropertiesW
ADVAPI32.dll
 0x51b000 RegOpenKeyExW
 0x51b004 RegQueryValueExW
 0x51b008 RegCreateKeyExW
 0x51b00c RegSetValueExW
 0x51b010 RegDeleteValueW
 0x51b014 RegDeleteKeyW
 0x51b018 RegEnumKeyW
 0x51b01c RegQueryValueW
 0x51b020 RegCloseKey
 0x51b024 RegEnumKeyExW
 0x51b028 RegEnumValueW
SHELL32.dll
 0x51b480 DragFinish
 0x51b484 ShellExecuteW
 0x51b488 SHGetDesktopFolder
 0x51b48c SHGetSpecialFolderLocation
 0x51b490 SHGetPathFromIDListW
 0x51b494 SHAppBarMessage
 0x51b498 DragQueryFileW
 0x51b49c CommandLineToArgvW
 0x51b4a0 SHGetFileInfoW
 0x51b4a4 SHBrowseForFolderW
SHLWAPI.dll
 0x51b4ac PathFindFileNameW
 0x51b4b0 PathStripToRootW
 0x51b4b4 PathIsUNCW
 0x51b4b8 PathFindExtensionW
 0x51b4bc PathRemoveFileSpecW
ole32.dll
 0x51b8bc CoUninitialize
 0x51b8c0 CoInitialize
 0x51b8c4 CoCreateInstance
 0x51b8c8 CoCreateGuid
 0x51b8cc OleDuplicateData
 0x51b8d0 ReleaseStgMedium
 0x51b8d4 OleCreateMenuDescriptor
 0x51b8d8 OleDestroyMenuDescriptor
 0x51b8dc OleTranslateAccelerator
 0x51b8e0 IsAccelerator
 0x51b8e4 OleLockRunning
 0x51b8e8 CreateStreamOnHGlobal
 0x51b8ec DoDragDrop
 0x51b8f0 RevokeDragDrop
 0x51b8f4 CoLockObjectExternal
 0x51b8f8 RegisterDragDrop
 0x51b8fc OleGetClipboard
 0x51b900 CoTaskMemFree
 0x51b904 CoInitializeEx
 0x51b908 CoTaskMemAlloc
OLEAUT32.dll
 0x51b454 VarBstrFromDate
 0x51b458 SystemTimeToVariantTime
 0x51b45c VariantTimeToSystemTime
 0x51b460 SysStringLen
 0x51b464 SysAllocString
 0x51b468 VariantInit
 0x51b46c VariantChangeType
 0x51b470 VariantClear
 0x51b474 SysAllocStringLen
 0x51b478 SysFreeString
gdiplus.dll
 0x51b860 GdipAlloc
 0x51b864 GdipDrawImageI
 0x51b868 GdipGetImageGraphicsContext
 0x51b86c GdipBitmapUnlockBits
 0x51b870 GdipBitmapLockBits
 0x51b874 GdipCreateBitmapFromScan0
 0x51b878 GdipCreateBitmapFromStream
 0x51b87c GdipGetImagePalette
 0x51b880 GdipGetImagePaletteSize
 0x51b884 GdipGetImagePixelFormat
 0x51b888 GdipGetImageHeight
 0x51b88c GdipGetImageWidth
 0x51b890 GdipCloneImage
 0x51b894 GdipDrawImageRectI
 0x51b898 GdipSetInterpolationMode
 0x51b89c GdipCreateFromHDC
 0x51b8a0 GdiplusShutdown
 0x51b8a4 GdiplusStartup
 0x51b8a8 GdipCreateBitmapFromHBITMAP
 0x51b8ac GdipDisposeImage
 0x51b8b0 GdipDeleteGraphics
 0x51b8b4 GdipFree
OLEACC.dll
 0x51b444 LresultFromObject
 0x51b448 AccessibleObjectFromWindow
 0x51b44c CreateStdAccessibleObject
IMM32.dll
 0x51b1c4 ImmGetOpenStatus
 0x51b1c8 ImmReleaseContext
 0x51b1cc ImmGetContext
WINMM.dll
 0x51b848 PlaySoundW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure