Report - resources.dll

Emotet Gen1 Generic Malware Malicious Library UPX Antivirus PE32 PE File DLL OS Processor Check
ScreenShot
Created 2024.02.15 08:05 Machine s1_win7_x6401
Filename resources.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
15.4
ZERO API file : mailcious
VT API (file) 8 detected (DanaBot, GenKryptik, GTWG, Artemis, Kryptik, CLOUD, HeurC, KVM008, Wacatac)
md5 e758e07113016aca55d9eda2b0ffeebe
sha256 2597322a49a6252445ca4c8d713320b238113b3b8fd8a2d6fc1088a5934cee0e
ssdeep 196608:JWx2zpdra2YbT8yN+8Mne5nd7g25FjZC8OH7RbFd/Or+GvJbU9RDf/kuFLOyomFI:JYCrdiNTF5nZ9C8Ud29JuF
imphash 607d0c9fedb370b1ce70573304bcd084
impfuzzy 192:PWNhFUfGfg3SklpdfsHUNeYuGnUjgc0c4cN/DCnbi/aB+351Hpp:PWLUfogikgXG+grXOabEaB+351Hpp
  Network IP location

Signature (36cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Attempts to create or modify system certificates
watch Attempts to disable browser security warnings
watch Attempts to identify installed AV products by installation directory
watch Checks the CPU name from registry
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Harvests information related to installed instant messenger clients
watch The process powershell.exe wrote an executable file to disk
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Searches running processes potentially to identify processes for sandbox evasion
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (11cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
195.133.88.98 Unknown 195.133.88.98 clean
62.173.146.41 RU Internet-Cosmos LLC 62.173.146.41 clean
91.201.67.85 IT Melbikomas UAB 91.201.67.85 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1097f1d0 LCMapStringW
 0x1097f1d4 GetStdHandle
 0x1097f1d8 GetFileType
 0x1097f1dc SetStdHandle
 0x1097f1e0 QueryPerformanceFrequency
 0x1097f1e4 VirtualQuery
 0x1097f1e8 VirtualAlloc
 0x1097f1ec GetSystemInfo
 0x1097f1f0 ExitThread
 0x1097f1f4 CreateThread
 0x1097f1f8 GetCommandLineW
 0x1097f1fc GetCommandLineA
 0x1097f200 GetModuleHandleExW
 0x1097f204 InterlockedFlushSList
 0x1097f208 RtlUnwind
 0x1097f20c RaiseException
 0x1097f210 OutputDebugStringW
 0x1097f214 GetTimeZoneInformation
 0x1097f218 GetConsoleOutputCP
 0x1097f21c HeapQueryInformation
 0x1097f220 SetFilePointerEx
 0x1097f224 FindFirstFileExW
 0x1097f228 FindNextFileW
 0x1097f22c GetACP
 0x1097f230 GetOEMCP
 0x1097f234 GetCPInfo
 0x1097f238 GetEnvironmentStringsW
 0x1097f23c FreeEnvironmentStringsW
 0x1097f240 SetEnvironmentVariableW
 0x1097f244 GetStringTypeW
 0x1097f248 InitializeSListHead
 0x1097f24c GetSystemTimeAsFileTime
 0x1097f250 QueryPerformanceCounter
 0x1097f254 GetStartupInfoW
 0x1097f258 IsDebuggerPresent
 0x1097f25c IsProcessorFeaturePresent
 0x1097f260 GetConsoleMode
 0x1097f264 TerminateProcess
 0x1097f268 SetUnhandledExceptionFilter
 0x1097f26c UnhandledExceptionFilter
 0x1097f270 SleepConditionVariableSRW
 0x1097f274 WakeAllConditionVariable
 0x1097f278 AcquireSRWLockExclusive
 0x1097f27c ReleaseSRWLockExclusive
 0x1097f280 SearchPathW
 0x1097f284 GetProfileIntW
 0x1097f288 GetTickCount64
 0x1097f28c GetTempPathW
 0x1097f290 SystemTimeToTzSpecificLocalTime
 0x1097f294 GetFileSizeEx
 0x1097f298 GetFileAttributesExW
 0x1097f29c FileTimeToLocalFileTime
 0x1097f2a0 GetWindowsDirectoryW
 0x1097f2a4 lstrcmpiW
 0x1097f2a8 GetCurrentProcess
 0x1097f2ac DuplicateHandle
 0x1097f2b0 WriteFile
 0x1097f2b4 UnlockFile
 0x1097f2b8 SetFilePointer
 0x1097f2bc SetEndOfFile
 0x1097f2c0 ReadFile
 0x1097f2c4 LockFile
 0x1097f2c8 GetVolumeInformationW
 0x1097f2cc FlushFileBuffers
 0x1097f2d0 FindFirstFileW
 0x1097f2d4 FindClose
 0x1097f2d8 GetFileSize
 0x1097f2dc CreateFileW
 0x1097f2e0 VerifyVersionInfoW
 0x1097f2e4 VerSetConditionMask
 0x1097f2e8 DeleteFileW
 0x1097f2ec GetCurrentDirectoryW
 0x1097f2f0 FileTimeToSystemTime
 0x1097f2f4 GetTempFileNameW
 0x1097f2f8 GetFullPathNameW
 0x1097f2fc GetFileTime
 0x1097f300 GetFileAttributesW
 0x1097f304 FindResourceExW
 0x1097f308 GetUserDefaultUILanguage
 0x1097f30c GetSystemDefaultUILanguage
 0x1097f310 GetLocaleInfoW
 0x1097f314 LocalReAlloc
 0x1097f318 LocalAlloc
 0x1097f31c GlobalHandle
 0x1097f320 TlsFree
 0x1097f324 TlsSetValue
 0x1097f328 TlsGetValue
 0x1097f32c TlsAlloc
 0x1097f330 InitializeCriticalSection
 0x1097f334 GlobalFlags
 0x1097f338 ResumeThread
 0x1097f33c SetThreadPriority
 0x1097f340 WaitForSingleObject
 0x1097f344 WritePrivateProfileStringW
 0x1097f348 GetPrivateProfileStringW
 0x1097f34c GetPrivateProfileIntW
 0x1097f350 lstrcpyW
 0x1097f354 GetVersionExW
 0x1097f358 GetCurrentThread
 0x1097f35c lstrcmpA
 0x1097f360 CopyFileW
 0x1097f364 FormatMessageW
 0x1097f368 LocalFree
 0x1097f36c GlobalSize
 0x1097f370 InitializeCriticalSectionAndSpinCount
 0x1097f374 WideCharToMultiByte
 0x1097f378 GlobalGetAtomNameW
 0x1097f37c GetCurrentProcessId
 0x1097f380 MultiByteToWideChar
 0x1097f384 VirtualProtect
 0x1097f388 MulDiv
 0x1097f38c CompareStringW
 0x1097f390 GlobalFindAtomW
 0x1097f394 GlobalAddAtomW
 0x1097f398 lstrcmpW
 0x1097f39c GlobalDeleteAtom
 0x1097f3a0 LoadLibraryA
 0x1097f3a4 LoadLibraryExW
 0x1097f3a8 FreeLibrary
 0x1097f3ac GetSystemDirectoryW
 0x1097f3b0 GetCurrentThreadId
 0x1097f3b4 EncodePointer
 0x1097f3b8 GlobalLock
 0x1097f3bc GlobalUnlock
 0x1097f3c0 LoadLibraryW
 0x1097f3c4 GetProcAddress
 0x1097f3c8 GetModuleHandleW
 0x1097f3cc GetModuleHandleA
 0x1097f3d0 GetModuleFileNameW
 0x1097f3d4 SetLastError
 0x1097f3d8 OutputDebugStringA
 0x1097f3dc Sleep
 0x1097f3e0 VirtualAllocEx
 0x1097f3e4 LoadLibraryExA
 0x1097f3e8 ExitProcess
 0x1097f3ec CloseHandle
 0x1097f3f0 IsValidCodePage
 0x1097f3f4 GlobalReAlloc
 0x1097f3f8 GlobalFree
 0x1097f3fc GlobalAlloc
 0x1097f400 FindResourceW
 0x1097f404 LoadResource
 0x1097f408 LockResource
 0x1097f40c SizeofResource
 0x1097f410 GetProcessHeap
 0x1097f414 DeleteCriticalSection
 0x1097f418 DecodePointer
 0x1097f41c HeapAlloc
 0x1097f420 HeapReAlloc
 0x1097f424 HeapFree
 0x1097f428 GetLastError
 0x1097f42c HeapSize
 0x1097f430 InitializeCriticalSectionEx
 0x1097f434 LeaveCriticalSection
 0x1097f438 EnterCriticalSection
 0x1097f43c FreeLibraryAndExitThread
 0x1097f440 WriteConsoleW
USER32.dll
 0x1097f4e0 PostQuitMessage
 0x1097f4e4 RemoveMenu
 0x1097f4e8 AppendMenuW
 0x1097f4ec InsertMenuW
 0x1097f4f0 GetMenuState
 0x1097f4f4 GetMenuStringW
 0x1097f4f8 SystemParametersInfoW
 0x1097f4fc IsRectEmpty
 0x1097f500 GetCursorPos
 0x1097f504 SetWindowRgn
 0x1097f508 KillTimer
 0x1097f50c SetTimer
 0x1097f510 ReuseDDElParam
 0x1097f514 UnpackDDElParam
 0x1097f518 LoadImageW
 0x1097f51c DestroyIcon
 0x1097f520 GetWindowThreadProcessId
 0x1097f524 SetRectEmpty
 0x1097f528 InsertMenuItemW
 0x1097f52c DestroyMenu
 0x1097f530 CreatePopupMenu
 0x1097f534 LoadMenuW
 0x1097f538 TranslateAcceleratorW
 0x1097f53c LoadAcceleratorsW
 0x1097f540 BringWindowToTop
 0x1097f544 MapVirtualKeyW
 0x1097f548 GetKeyNameTextW
 0x1097f54c MapDialogRect
 0x1097f550 GetAsyncKeyState
 0x1097f554 ReleaseDC
 0x1097f558 GetWindowDC
 0x1097f55c GetDC
 0x1097f560 TabbedTextOutW
 0x1097f564 GrayStringW
 0x1097f568 DrawTextExW
 0x1097f56c DrawTextW
 0x1097f570 IsDialogMessageW
 0x1097f574 SetWindowTextW
 0x1097f578 CheckDlgButton
 0x1097f57c MoveWindow
 0x1097f580 ShowWindow
 0x1097f584 LoadBitmapW
 0x1097f588 SetMenuItemInfoW
 0x1097f58c GetMenuCheckMarkDimensions
 0x1097f590 SetMenuItemBitmaps
 0x1097f594 EnableMenuItem
 0x1097f598 CheckMenuItem
 0x1097f59c GetMonitorInfoW
 0x1097f5a0 MonitorFromWindow
 0x1097f5a4 WinHelpW
 0x1097f5a8 GetScrollInfo
 0x1097f5ac SetScrollInfo
 0x1097f5b0 CallNextHookEx
 0x1097f5b4 UnhookWindowsHookEx
 0x1097f5b8 SetWindowsHookExW
 0x1097f5bc GetWindow
 0x1097f5c0 GetLastActivePopup
 0x1097f5c4 DrawEdge
 0x1097f5c8 GetClassNameW
 0x1097f5cc GetClassLongW
 0x1097f5d0 EqualRect
 0x1097f5d4 MapWindowPoints
 0x1097f5d8 ScreenToClient
 0x1097f5dc MessageBoxW
 0x1097f5e0 GetWindowTextLengthW
 0x1097f5e4 GetWindowTextW
 0x1097f5e8 RemovePropW
 0x1097f5ec GetPropW
 0x1097f5f0 SetPropW
 0x1097f5f4 ShowScrollBar
 0x1097f5f8 GetScrollRange
 0x1097f5fc SetScrollRange
 0x1097f600 GetScrollPos
 0x1097f604 EmptyClipboard
 0x1097f608 ScrollWindow
 0x1097f60c RedrawWindow
 0x1097f610 ValidateRect
 0x1097f614 EndPaint
 0x1097f618 BeginPaint
 0x1097f61c SetForegroundWindow
 0x1097f620 GetForegroundWindow
 0x1097f624 UpdateWindow
 0x1097f628 TrackPopupMenu
 0x1097f62c GetMenuItemCount
 0x1097f630 GetMenuItemID
 0x1097f634 GetSubMenu
 0x1097f638 SetMenu
 0x1097f63c GetMenu
 0x1097f640 GetCapture
 0x1097f644 GetKeyState
 0x1097f648 GetFocus
 0x1097f64c SetFocus
 0x1097f650 GetDlgCtrlID
 0x1097f654 IsWindowVisible
 0x1097f658 SetWindowPlacement
 0x1097f65c GetWindowPlacement
 0x1097f660 SetWindowPos
 0x1097f664 IsChild
 0x1097f668 MonitorFromPoint
 0x1097f66c TrackMouseEvent
 0x1097f670 IsZoomed
 0x1097f674 EnableWindow
 0x1097f678 GetWindowRect
 0x1097f67c UnionRect
 0x1097f680 GetClientRect
 0x1097f684 SendMessageW
 0x1097f688 IsMenu
 0x1097f68c CreateWindowExW
 0x1097f690 GetClassInfoExW
 0x1097f694 GetClassInfoW
 0x1097f698 RegisterClassW
 0x1097f69c DefWindowProcW
 0x1097f6a0 PostMessageW
 0x1097f6a4 GetMessageTime
 0x1097f6a8 GetMessagePos
 0x1097f6ac PeekMessageW
 0x1097f6b0 DispatchMessageW
 0x1097f6b4 RegisterWindowMessageW
 0x1097f6b8 GetParent
 0x1097f6bc GetDesktopWindow
 0x1097f6c0 SetActiveWindow
 0x1097f6c4 DrawStateW
 0x1097f6c8 GetSysColorBrush
 0x1097f6cc DrawFocusRect
 0x1097f6d0 InflateRect
 0x1097f6d4 DrawIconEx
 0x1097f6d8 GetMessageW
 0x1097f6dc TranslateMessage
 0x1097f6e0 ShowOwnedPopups
 0x1097f6e4 SendDlgItemMessageA
 0x1097f6e8 RealChildWindowFromPoint
 0x1097f6ec GetMenuItemInfoW
 0x1097f6f0 CopyImage
 0x1097f6f4 GetSystemMenu
 0x1097f6f8 IsWindowEnabled
 0x1097f6fc GetActiveWindow
 0x1097f700 DeleteMenu
 0x1097f704 SetParent
 0x1097f708 WaitMessage
 0x1097f70c SetLayeredWindowAttributes
 0x1097f710 EnumDisplayMonitors
 0x1097f714 OpenClipboard
 0x1097f718 CloseClipboard
 0x1097f71c GetTopWindow
 0x1097f720 FillRect
 0x1097f724 OffsetRect
 0x1097f728 CopyRect
 0x1097f72c GetSystemMetrics
 0x1097f730 SetWindowLongW
 0x1097f734 BeginDeferWindowPos
 0x1097f738 DeferWindowPos
 0x1097f73c EndDeferWindowPos
 0x1097f740 InvalidateRect
 0x1097f744 ClientToScreen
 0x1097f748 WindowFromPoint
 0x1097f74c PtInRect
 0x1097f750 ReleaseCapture
 0x1097f754 SetCursor
 0x1097f758 DestroyCursor
 0x1097f75c SetCapture
 0x1097f760 LoadCursorW
 0x1097f764 GetWindowLongW
 0x1097f768 AdjustWindowRectEx
 0x1097f76c CallWindowProcW
 0x1097f770 SetRect
 0x1097f774 SubtractRect
 0x1097f778 IntersectRect
 0x1097f77c DrawFrameControl
 0x1097f780 GetSysColor
 0x1097f784 CreateDialogParamA
 0x1097f788 GetWindowLongA
 0x1097f78c LoadIconW
 0x1097f790 IsIconic
 0x1097f794 DrawIcon
 0x1097f798 IsWindow
 0x1097f79c DestroyWindow
 0x1097f7a0 CreateDialogIndirectParamW
 0x1097f7a4 EndDialog
 0x1097f7a8 GetDlgItem
 0x1097f7ac GetNextDlgTabItem
 0x1097f7b0 CharUpperW
 0x1097f7b4 MessageBeep
 0x1097f7b8 NotifyWinEvent
 0x1097f7bc SetCursorPos
 0x1097f7c0 SetClipboardData
 0x1097f7c4 LockWindowUpdate
 0x1097f7c8 EnableScrollBar
 0x1097f7cc GetWindowRgn
 0x1097f7d0 CreateMenu
 0x1097f7d4 InvertRect
 0x1097f7d8 HideCaret
 0x1097f7dc GetComboBoxInfo
 0x1097f7e0 TranslateMDISysAccel
 0x1097f7e4 DefMDIChildProcW
 0x1097f7e8 DefFrameProcW
 0x1097f7ec DrawMenuBar
 0x1097f7f0 MapVirtualKeyExW
 0x1097f7f4 IsCharLowerW
 0x1097f7f8 GetNextDlgGroupItem
 0x1097f7fc PostThreadMessageW
 0x1097f800 IsClipboardFormatAvailable
 0x1097f804 FrameRect
 0x1097f808 CharUpperBuffW
 0x1097f80c RegisterClipboardFormatW
 0x1097f810 CopyAcceleratorTableW
 0x1097f814 CreateAcceleratorTableW
 0x1097f818 GetKeyboardState
 0x1097f81c GetKeyboardLayout
 0x1097f820 ToUnicodeEx
 0x1097f824 UpdateLayeredWindow
 0x1097f828 GetUpdateRect
 0x1097f82c SetClassLongW
 0x1097f830 DestroyAcceleratorTable
 0x1097f834 ModifyMenuW
 0x1097f838 SetMenuDefaultItem
 0x1097f83c GetMenuDefaultItem
 0x1097f840 CopyIcon
 0x1097f844 GetIconInfo
 0x1097f848 SetScrollPos
 0x1097f84c GetDoubleClickTime
GDI32.dll
 0x1097f038 GetDeviceCaps
 0x1097f03c GetObjectType
 0x1097f040 GetPixel
 0x1097f044 GetStockObject
 0x1097f048 GetViewportExtEx
 0x1097f04c GetWindowExtEx
 0x1097f050 IntersectClipRect
 0x1097f054 LineTo
 0x1097f058 PtVisible
 0x1097f05c RectVisible
 0x1097f060 RestoreDC
 0x1097f064 SaveDC
 0x1097f068 SelectClipRgn
 0x1097f06c ExtSelectClipRgn
 0x1097f070 SelectObject
 0x1097f074 SelectPalette
 0x1097f078 SetBkMode
 0x1097f07c SetMapMode
 0x1097f080 SetLayout
 0x1097f084 GetLayout
 0x1097f088 SetPolyFillMode
 0x1097f08c SetROP2
 0x1097f090 SetTextAlign
 0x1097f094 MoveToEx
 0x1097f098 TextOutW
 0x1097f09c ExtTextOutW
 0x1097f0a0 SetViewportExtEx
 0x1097f0a4 SetViewportOrgEx
 0x1097f0a8 SetWindowExtEx
 0x1097f0ac SetWindowOrgEx
 0x1097f0b0 OffsetViewportOrgEx
 0x1097f0b4 OffsetWindowOrgEx
 0x1097f0b8 ScaleViewportExtEx
 0x1097f0bc ScaleWindowExtEx
 0x1097f0c0 CreateRectRgnIndirect
 0x1097f0c4 PatBlt
 0x1097f0c8 CreateCompatibleBitmap
 0x1097f0cc CreateEllipticRgn
 0x1097f0d0 GetClipBox
 0x1097f0d4 CreateDIBSection
 0x1097f0d8 DPtoLP
 0x1097f0dc LPtoDP
 0x1097f0e0 CopyMetaFileW
 0x1097f0e4 CreateDCW
 0x1097f0e8 CombineRgn
 0x1097f0ec GetBkColor
 0x1097f0f0 GetTextColor
 0x1097f0f4 GetTextExtentPoint32W
 0x1097f0f8 CreatePolygonRgn
 0x1097f0fc Polygon
 0x1097f100 Polyline
 0x1097f104 GetTextMetricsW
 0x1097f108 CreateFontIndirectW
 0x1097f10c SetRectRgn
 0x1097f110 EnumFontFamiliesExW
 0x1097f114 CreateDIBitmap
 0x1097f118 EnumFontFamiliesW
 0x1097f11c GetTextCharsetInfo
 0x1097f120 RealizePalette
 0x1097f124 SetPixel
 0x1097f128 StretchBlt
 0x1097f12c SetDIBColorTable
 0x1097f130 CreateRoundRectRgn
 0x1097f134 GetRgnBox
 0x1097f138 OffsetRgn
 0x1097f13c RoundRect
 0x1097f140 CreatePalette
 0x1097f144 GetPaletteEntries
 0x1097f148 GetNearestPaletteIndex
 0x1097f14c GetSystemPaletteEntries
 0x1097f150 ExtFloodFill
 0x1097f154 SetPaletteEntries
 0x1097f158 FillRgn
 0x1097f15c FrameRgn
 0x1097f160 GetBoundsRect
 0x1097f164 PtInRegion
 0x1097f168 GetViewportOrgEx
 0x1097f16c GetWindowOrgEx
 0x1097f170 SetPixelV
 0x1097f174 GetTextFaceW
 0x1097f178 ExcludeClipRect
 0x1097f17c Escape
 0x1097f180 DeleteObject
 0x1097f184 CreateSolidBrush
 0x1097f188 CreateRectRgn
 0x1097f18c CreatePatternBrush
 0x1097f190 CreatePen
 0x1097f194 CreateHatchBrush
 0x1097f198 CreateCompatibleDC
 0x1097f19c CreateBitmap
 0x1097f1a0 GetObjectW
 0x1097f1a4 SetTextColor
 0x1097f1a8 SetBkColor
 0x1097f1ac Rectangle
 0x1097f1b0 Ellipse
 0x1097f1b4 BitBlt
 0x1097f1b8 DeleteDC
MSIMG32.dll
 0x1097f448 TransparentBlt
 0x1097f44c AlphaBlend
WINSPOOL.DRV
 0x1097f890 OpenPrinterW
 0x1097f894 DocumentPropertiesW
 0x1097f898 ClosePrinter
ADVAPI32.dll
 0x1097f000 RegSetValueExW
 0x1097f004 RegEnumKeyExW
 0x1097f008 RegEnumValueW
 0x1097f00c RegQueryValueW
 0x1097f010 RegEnumKeyW
 0x1097f014 RegCloseKey
 0x1097f018 RegDeleteValueW
 0x1097f01c RegDeleteKeyW
 0x1097f020 RegCreateKeyExW
 0x1097f024 RegQueryValueExW
 0x1097f028 RegOpenKeyExW
SHELL32.dll
 0x1097f498 DragFinish
 0x1097f49c SHGetMalloc
 0x1097f4a0 SHGetPathFromIDListW
 0x1097f4a4 SHGetSpecialFolderLocation
 0x1097f4a8 SHBrowseForFolderW
 0x1097f4ac SHGetDesktopFolder
 0x1097f4b0 SHAppBarMessage
 0x1097f4b4 ShellExecuteW
 0x1097f4b8 SHGetFileInfoW
 0x1097f4bc DragQueryFileW
COMCTL32.dll
 0x1097f030 InitCommonControlsEx
SHLWAPI.dll
 0x1097f4c4 PathFindExtensionW
 0x1097f4c8 PathStripToRootW
 0x1097f4cc StrFormatKBSizeW
 0x1097f4d0 PathRemoveFileSpecW
 0x1097f4d4 PathIsUNCW
 0x1097f4d8 PathFindFileNameW
UxTheme.dll
 0x1097f854 GetThemeSysColor
 0x1097f858 GetWindowTheme
 0x1097f85c GetThemePartSize
 0x1097f860 DrawThemeParentBackground
 0x1097f864 IsThemeBackgroundPartiallyTransparent
 0x1097f868 CloseThemeData
 0x1097f86c OpenThemeData
 0x1097f870 DrawThemeBackground
 0x1097f874 GetThemeColor
 0x1097f878 GetCurrentThemeName
 0x1097f87c IsAppThemed
 0x1097f880 DrawThemeText
ole32.dll
 0x1097f8fc RegisterDragDrop
 0x1097f900 CoLockObjectExternal
 0x1097f904 OleLockRunning
 0x1097f908 OleCreateMenuDescriptor
 0x1097f90c OleDestroyMenuDescriptor
 0x1097f910 OleTranslateAccelerator
 0x1097f914 IsAccelerator
 0x1097f918 RevokeDragDrop
 0x1097f91c OleGetClipboard
 0x1097f920 DoDragDrop
 0x1097f924 CoInitializeEx
 0x1097f928 CreateStreamOnHGlobal
 0x1097f92c CoDisconnectObject
 0x1097f930 CoInitialize
 0x1097f934 CoCreateInstance
 0x1097f938 CoCreateGuid
 0x1097f93c CoUninitialize
 0x1097f940 ReleaseStgMedium
 0x1097f944 OleDuplicateData
 0x1097f948 CoTaskMemFree
 0x1097f94c CoTaskMemAlloc
OLEAUT32.dll
 0x1097f464 SysStringLen
 0x1097f468 SystemTimeToVariantTime
 0x1097f46c VariantTimeToSystemTime
 0x1097f470 VariantChangeType
 0x1097f474 LoadTypeLib
 0x1097f478 VariantCopy
 0x1097f47c VarBstrFromDate
 0x1097f480 VariantClear
 0x1097f484 SysAllocString
 0x1097f488 SysFreeString
 0x1097f48c VariantInit
 0x1097f490 SysAllocStringLen
gdiplus.dll
 0x1097f8a0 GdipDrawImageRectI
 0x1097f8a4 GdipSetInterpolationMode
 0x1097f8a8 GdipCreateFromHDC
 0x1097f8ac GdipCreateBitmapFromHBITMAP
 0x1097f8b0 GdipDrawImageI
 0x1097f8b4 GdipDeleteGraphics
 0x1097f8b8 GdipBitmapUnlockBits
 0x1097f8bc GdipBitmapLockBits
 0x1097f8c0 GdipCreateBitmapFromScan0
 0x1097f8c4 GdipCreateBitmapFromStream
 0x1097f8c8 GdipGetImagePaletteSize
 0x1097f8cc GdipGetImagePalette
 0x1097f8d0 GdipGetImagePixelFormat
 0x1097f8d4 GdipGetImageHeight
 0x1097f8d8 GdipGetImageWidth
 0x1097f8dc GdipGetImageGraphicsContext
 0x1097f8e0 GdipDisposeImage
 0x1097f8e4 GdipCloneImage
 0x1097f8e8 GdiplusStartup
 0x1097f8ec GdipFree
 0x1097f8f0 GdipAlloc
 0x1097f8f4 GdiplusShutdown
OLEACC.dll
 0x1097f454 AccessibleObjectFromWindow
 0x1097f458 LresultFromObject
 0x1097f45c CreateStdAccessibleObject
IMM32.dll
 0x1097f1c0 ImmReleaseContext
 0x1097f1c4 ImmGetOpenStatus
 0x1097f1c8 ImmGetContext
WINMM.dll
 0x1097f888 PlaySoundW

EAT(Export Address Table) Library

0x108093e0 CIrNTzBaPkppGNf
0x108093e0 CZnIUAAeJ
0x108093e0 FxJWXdx
0x108093e0 GbmgwMEzKpXc
0x108093e0 HipXGmygXapBRYfa
0x108093e0 IYfRriwGvbgbXBXReH
0x108093e0 LKSMdMaTT
0x108093e0 NpZatICsK
0x108093e0 SOdCGqnNtDWyDo
0x108093e0 UAyCqwHRBMHCdHlVz
0x108093e0 ZfDMgndWxjR
0x108093e0 iBZHcoeoarRd
0x108093e0 jERKotJBwfw
0x108093e0 nkYPRlgSTnlUkuDTW
0x108093e0 rtVNQhSpgienExR
0x10813180 start
0x108093e0 uMRRtkuQVecTfq
0x108093e0 ukniOqaVKgeX
0x108093e0 yVmJFl


Similarity measure (PE file only) - Checking for service failure