Report - am.exe

Gen1 Generic Malware Malicious Library Antivirus Obsidium protector .NET framework(MSIL) UPX Anti_VM PE File PE32 OS Processor Check PNG Format
ScreenShot
Created 2024.06.17 16:58 Machine s1_win7_x6401
Filename am.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
10.4
ZERO API file : clean
VT API (file) 37 detected (Penguish, GenericKD, Unsafe, Vcxb, malicious, Rugmi, YzY0OkAwxJ5TJ1ob, Maldldr, rddne, LUMMASTEALER, YXEFLZ, Detected, ai score=81, BScope, Chgt, MxResIcn, PossibleThreat, confidence, 100%)
md5 6cfddd5ce9ca4bb209bd5d8c2cd80025
sha256 376e1802b979514ba0e9c73933a8c6a09dd3f1d2a289f420c2202e64503d08a7
ssdeep 98304:kHRNlpNpt3gSuDdFeznbkRBLwX1Pgedmv72Im/xAgDXMnw4bmVKAHNAXqcMHKYsN:uRrptYDdF8komd8xAUXMwIwHNvcMmN
imphash 9e52db722994d0b4983cfb7f894f2a8e
impfuzzy 384:CXQz/i384paCsuBuxksRTsNZ2DKgTbFCR:CO/i38QdsouZRTgAbER
  Network IP location

Signature (27cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe
watch Network communications indicative of possible code injection originated from the process explorer.exe
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Poweshell is sending data to a remote host
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice URL downloaded by powershell script
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (14cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Obsidium_Zero Obsidium protector file binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch Win32_Trojan_PWS_Net_1_Zero Win32 Trojan PWS .NET Azorult binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)

Network (10cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://proresupdate.com/h9fmdW5/index.php Unknown 45.152.112.146 clean
https://contur2fa.recipeupdates.rest/__hh/files/run_search US CLOUDFLARENET 172.67.197.250 clean
https://contur2fa.recipeupdates.rest/__hh/files/run US CLOUDFLARENET 172.67.197.250 clean
https://i.imgur.com/yximuB4.png Unknown 146.75.92.193 clean
contur2fa.recipeupdates.rest US CLOUDFLARENET 172.67.197.250 clean
i.imgur.com US FASTLY 199.232.192.193 mailcious
proresupdate.com Unknown 45.152.112.146 clean
45.152.112.146 Unknown 45.152.112.146 clean
172.67.197.250 US CLOUDFLARENET 172.67.197.250 clean
146.75.92.193 Unknown 146.75.92.193 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

WTSAPI32.dll
 0x71ea08 WTSQuerySessionInformationW
 0x71ea0c WTSFreeMemory
 0x71ea10 WTSEnumerateSessionsW
VERSION.dll
 0x71e948 VerQueryValueW
 0x71e94c GetFileVersionInfoA
 0x71e950 VerQueryValueA
 0x71e954 GetFileVersionInfoSizeA
 0x71e958 GetFileVersionInfoW
 0x71e95c GetFileVersionInfoSizeW
IPHLPAPI.DLL
 0x71e210 GetAdaptersAddresses
WININET.dll
 0x71e964 HttpQueryInfoW
 0x71e968 InternetOpenW
 0x71e96c InternetOpenUrlW
 0x71e970 HttpOpenRequestW
 0x71e974 InternetCloseHandle
 0x71e978 InternetConnectW
 0x71e97c HttpAddRequestHeadersW
 0x71e980 InternetQueryDataAvailable
 0x71e984 HttpSendRequestW
 0x71e988 InternetCrackUrlW
 0x71e98c InternetReadFile
 0x71e990 InternetGetConnectedStateExW
KERNEL32.dll
 0x71e218 CreateSemaphoreW
 0x71e21c VirtualQueryEx
 0x71e220 SetUnhandledExceptionFilter
 0x71e224 GetSystemTime
 0x71e228 DuplicateHandle
 0x71e22c MulDiv
 0x71e230 SetLastError
 0x71e234 lstrcmpiW
 0x71e238 lstrlenW
 0x71e23c CompareStringW
 0x71e240 GetCurrentThreadId
 0x71e244 GetSystemTimeAsFileTime
 0x71e248 WritePrivateProfileStringW
 0x71e24c FileTimeToSystemTime
 0x71e250 SystemTimeToFileTime
 0x71e254 InitializeCriticalSection
 0x71e258 MultiByteToWideChar
 0x71e25c DeleteFileW
 0x71e260 GetPrivateProfileStringW
 0x71e264 WideCharToMultiByte
 0x71e268 RaiseException
 0x71e26c DeleteCriticalSection
 0x71e270 InitializeCriticalSectionAndSpinCount
 0x71e274 GetLastError
 0x71e278 LeaveCriticalSection
 0x71e27c EnterCriticalSection
 0x71e280 ResetEvent
 0x71e284 OpenEventA
 0x71e288 SetEvent
 0x71e28c GetCurrentProcessId
 0x71e290 CreateEventA
 0x71e294 WaitForSingleObjectEx
 0x71e298 GetModuleFileNameW
 0x71e29c GetVersionExW
 0x71e2a0 CloseHandle
 0x71e2a4 GetCurrentProcess
 0x71e2a8 GetModuleHandleW
 0x71e2ac GetProcAddress
 0x71e2b0 FindResourceExW
 0x71e2b4 FindResourceW
 0x71e2b8 LoadResource
 0x71e2bc LockResource
 0x71e2c0 SizeofResource
 0x71e2c4 GetProcessHeap
 0x71e2c8 HeapAlloc
 0x71e2cc HeapFree
 0x71e2d0 HeapReAlloc
 0x71e2d4 HeapSize
 0x71e2d8 HeapDestroy
 0x71e2dc CreateThread
 0x71e2e0 ResumeThread
 0x71e2e4 RtlCaptureContext
 0x71e2e8 WriteConsoleW
 0x71e2ec SetEndOfFile
 0x71e2f0 SetStdHandle
 0x71e2f4 SetEnvironmentVariableW
 0x71e2f8 SetEnvironmentVariableA
 0x71e2fc FreeEnvironmentStringsW
 0x71e300 GetEnvironmentStringsW
 0x71e304 GetCommandLineA
 0x71e308 FindFirstFileExW
 0x71e30c ReadConsoleW
 0x71e310 GetOEMCP
 0x71e314 IsValidCodePage
 0x71e318 SetFilePointerEx
 0x71e31c FlushFileBuffers
 0x71e320 EnumSystemLocalesW
 0x71e324 IsValidLocale
 0x71e328 GetConsoleMode
 0x71e32c GetConsoleCP
 0x71e330 GetStdHandle
 0x71e334 FreeLibraryAndExitThread
 0x71e338 GetACP
 0x71e33c GetModuleHandleExW
 0x71e340 RtlUnwind
 0x71e344 GetStringTypeExA
 0x71e348 GetUserDefaultLCID
 0x71e34c LCMapStringA
 0x71e350 GetStringTypeExW
 0x71e354 TerminateProcess
 0x71e358 UnhandledExceptionFilter
 0x71e35c LoadLibraryExA
 0x71e360 IsProcessorFeaturePresent
 0x71e364 FlushInstructionCache
 0x71e368 InterlockedPushEntrySList
 0x71e36c InterlockedPopEntrySList
 0x71e370 InitializeSListHead
 0x71e374 IsDebuggerPresent
 0x71e378 CreateWaitableTimerA
 0x71e37c GetCPInfo
 0x71e380 LCMapStringW
 0x71e384 EncodePointer
 0x71e388 GetStringTypeW
 0x71e38c OutputDebugStringW
 0x71e390 lstrcmpiA
 0x71e394 GetSystemDirectoryA
 0x71e398 GetSystemDirectoryW
 0x71e39c GlobalMemoryStatusEx
 0x71e3a0 CancelIo
 0x71e3a4 SetThreadPriority
 0x71e3a8 GetProcessAffinityMask
 0x71e3ac SetProcessAffinityMask
 0x71e3b0 SetThreadAffinityMask
 0x71e3b4 FindResourceA
 0x71e3b8 GetWindowsDirectoryA
 0x71e3bc DeleteFileA
 0x71e3c0 RemoveDirectoryA
 0x71e3c4 GetComputerNameA
 0x71e3c8 GetTempPathW
 0x71e3cc GetWindowsDirectoryW
 0x71e3d0 VirtualFree
 0x71e3d4 VirtualAlloc
 0x71e3d8 CompareFileTime
 0x71e3dc OpenProcess
 0x71e3e0 GetSystemDefaultLCID
 0x71e3e4 GetGeoInfoW
 0x71e3e8 GetUserGeoID
 0x71e3ec GetSystemPowerStatus
 0x71e3f0 SetErrorMode
 0x71e3f4 ExitThread
 0x71e3f8 GetDiskFreeSpaceA
 0x71e3fc CreateFileA
 0x71e400 LocalAlloc
 0x71e404 GetCurrentDirectoryA
 0x71e408 CreateDirectoryA
 0x71e40c CreateMutexA
 0x71e410 ReleaseMutex
 0x71e414 GetVersionExA
 0x71e418 LoadLibraryA
 0x71e41c GetComputerNameExW
 0x71e420 DeviceIoControl
 0x71e424 GetDriveTypeW
 0x71e428 GetTempPathA
 0x71e42c GlobalMemoryStatus
 0x71e430 GetModuleHandleA
 0x71e434 GetTickCount
 0x71e438 GetTimeZoneInformation
 0x71e43c SystemTimeToTzSpecificLocalTime
 0x71e440 PeekNamedPipe
 0x71e444 CreatePipe
 0x71e448 Process32NextW
 0x71e44c Process32FirstW
 0x71e450 CreateToolhelp32Snapshot
 0x71e454 ReadFile
 0x71e458 QueryPerformanceFrequency
 0x71e45c QueryPerformanceCounter
 0x71e460 SetWaitableTimer
 0x71e464 WaitForMultipleObjects
 0x71e468 InterlockedExchangeAdd
 0x71e46c TerminateThread
 0x71e470 VerSetConditionMask
 0x71e474 VerifyVersionInfoW
 0x71e478 TlsFree
 0x71e47c TlsGetValue
 0x71e480 TlsAlloc
 0x71e484 TlsSetValue
 0x71e488 lstrlenA
 0x71e48c ExitProcess
 0x71e490 GetNumberFormatW
 0x71e494 GetLocaleInfoW
 0x71e498 InterlockedExchange
 0x71e49c FindNextFileW
 0x71e4a0 FindFirstFileW
 0x71e4a4 GetFullPathNameW
 0x71e4a8 FindClose
 0x71e4ac RemoveDirectoryW
 0x71e4b0 GlobalUnlock
 0x71e4b4 GlobalAlloc
 0x71e4b8 lstrcmpA
 0x71e4bc GetModuleFileNameA
 0x71e4c0 SetFileTime
 0x71e4c4 SetFilePointer
 0x71e4c8 GetFileSize
 0x71e4cc GetFileAttributesExW
 0x71e4d0 UnmapViewOfFile
 0x71e4d4 MapViewOfFile
 0x71e4d8 CreateFileMappingW
 0x71e4dc LocalFree
 0x71e4e0 FormatMessageW
 0x71e4e4 GetCurrentThread
 0x71e4e8 LoadLibraryW
 0x71e4ec GetTimeFormatW
 0x71e4f0 GetDateFormatW
 0x71e4f4 WaitForMultipleObjectsEx
 0x71e4f8 GlobalLock
 0x71e4fc CreateSemaphoreA
 0x71e500 ReleaseSemaphore
 0x71e504 GetComputerNameW
 0x71e508 WriteFile
 0x71e50c CreateFileW
 0x71e510 WaitForSingleObject
 0x71e514 HeapCreate
 0x71e518 DecodePointer
 0x71e51c FormatMessageA
 0x71e520 GetCommandLineW
 0x71e524 CreateProcessW
 0x71e528 GetStartupInfoW
 0x71e52c GetLocalTime
 0x71e530 InterlockedDecrement
 0x71e534 InterlockedIncrement
 0x71e538 LoadLibraryExW
 0x71e53c FreeLibrary
 0x71e540 Sleep
 0x71e544 GetPrivateProfileStructW
 0x71e548 WritePrivateProfileStructW
 0x71e54c GetFileType
 0x71e550 CreateEventW
 0x71e554 GlobalFree
 0x71e558 GetSystemInfo
USER32.dll
 0x71e6d0 GetDlgItem
 0x71e6d4 SendMessageW
 0x71e6d8 GetWindowRect
 0x71e6dc SetWindowLongW
 0x71e6e0 LoadImageW
 0x71e6e4 CheckRadioButton
 0x71e6e8 ShowWindow
 0x71e6ec ScreenToClient
 0x71e6f0 MoveWindow
 0x71e6f4 IsWindow
 0x71e6f8 IsDlgButtonChecked
 0x71e6fc EnableWindow
 0x71e700 DefWindowProcW
 0x71e704 CallWindowProcW
 0x71e708 GetParent
 0x71e70c DestroyIcon
 0x71e710 LoadIconW
 0x71e714 SetDlgItemTextW
 0x71e718 EnumWindows
 0x71e71c SetWindowPos
 0x71e720 MapWindowPoints
 0x71e724 GetClientRect
 0x71e728 GetMonitorInfoW
 0x71e72c MonitorFromWindow
 0x71e730 GetWindow
 0x71e734 SetWindowTextW
 0x71e738 DestroyWindow
 0x71e73c keybd_event
 0x71e740 OffsetRect
 0x71e744 DrawTextW
 0x71e748 ReleaseDC
 0x71e74c GetDC
 0x71e750 CharNextW
 0x71e754 GetWindowTextW
 0x71e758 GetWindowTextLengthW
 0x71e75c CreateWindowExW
 0x71e760 SystemParametersInfoW
 0x71e764 LoadCursorW
 0x71e768 GetClassNameW
 0x71e76c SetRectEmpty
 0x71e770 InvalidateRect
 0x71e774 UpdateWindow
 0x71e778 PtInRect
 0x71e77c GetCursorPos
 0x71e780 GetDlgCtrlID
 0x71e784 ReleaseCapture
 0x71e788 LoadStringA
 0x71e78c IsWindowVisible
 0x71e790 GetWindowLongW
 0x71e794 UnregisterClassW
 0x71e798 GetClipboardData
 0x71e79c IsClipboardFormatAvailable
 0x71e7a0 CloseClipboard
 0x71e7a4 SetClipboardData
 0x71e7a8 EmptyClipboard
 0x71e7ac OpenClipboard
 0x71e7b0 GetDlgItemTextW
 0x71e7b4 BringWindowToTop
 0x71e7b8 CharLowerA
 0x71e7bc CharLowerW
 0x71e7c0 DrawTextExW
 0x71e7c4 GetSysColorBrush
 0x71e7c8 MapDialogRect
 0x71e7cc LoadBitmapW
 0x71e7d0 SetWindowPlacement
 0x71e7d4 GetWindowPlacement
 0x71e7d8 GetMenuItemCount
 0x71e7dc CheckMenuItem
 0x71e7e0 IsIconic
 0x71e7e4 SwitchToThisWindow
 0x71e7e8 TranslateAcceleratorW
 0x71e7ec MonitorFromRect
 0x71e7f0 EnableMenuItem
 0x71e7f4 GetTopWindow
 0x71e7f8 PostQuitMessage
 0x71e7fc LoadAcceleratorsW
 0x71e800 GetClassLongW
 0x71e804 SetClassLongW
 0x71e808 DeleteMenu
 0x71e80c CheckDlgButton
 0x71e810 EndDialog
 0x71e814 IsMenu
 0x71e818 GetMenuDefaultItem
 0x71e81c LoadMenuW
 0x71e820 GetSubMenu
 0x71e824 SetForegroundWindow
 0x71e828 CreateIconIndirect
 0x71e82c SetMenuDefaultItem
 0x71e830 RegisterWindowMessageW
 0x71e834 InsertMenuItemW
 0x71e838 GetMenuItemInfoW
 0x71e83c SetMenuItemInfoW
 0x71e840 CreateMenu
 0x71e844 CopyRect
 0x71e848 GetDesktopWindow
 0x71e84c GetMenu
 0x71e850 LoadStringW
 0x71e854 GetForegroundWindow
 0x71e858 CreateDialogParamW
 0x71e85c DialogBoxParamW
 0x71e860 PeekMessageW
 0x71e864 GetMessageW
 0x71e868 TranslateMessage
 0x71e86c DispatchMessageW
 0x71e870 RegisterClassW
 0x71e874 GetClassInfoW
 0x71e878 GetActiveWindow
 0x71e87c MessageBoxW
 0x71e880 FindWindowW
 0x71e884 CallNextHookEx
 0x71e888 SetWindowsHookExW
 0x71e88c UnhookWindowsHookEx
 0x71e890 GetKeyboardState
 0x71e894 DestroyCursor
 0x71e898 DestroyMenu
 0x71e89c MonitorFromPoint
 0x71e8a0 CreatePopupMenu
 0x71e8a4 TrackPopupMenu
 0x71e8a8 AppendMenuW
 0x71e8ac GetDoubleClickTime
 0x71e8b0 GetMessageTime
 0x71e8b4 KillTimer
 0x71e8b8 SetTimer
 0x71e8bc RedrawWindow
 0x71e8c0 IntersectRect
 0x71e8c4 DrawEdge
 0x71e8c8 SetWindowRgn
 0x71e8cc GetScrollPos
 0x71e8d0 SetScrollPos
 0x71e8d4 GetScrollRange
 0x71e8d8 SetScrollRange
 0x71e8dc GetScrollInfo
 0x71e8e0 SetScrollInfo
 0x71e8e4 ShowScrollBar
 0x71e8e8 GetClassInfoExW
 0x71e8ec RegisterClassExW
 0x71e8f0 GetKeyState
 0x71e8f4 GetSystemMetrics
 0x71e8f8 InflateRect
 0x71e8fc PostMessageW
 0x71e900 GetWindowDC
 0x71e904 IsCharAlphaNumericW
 0x71e908 BeginPaint
 0x71e90c EndPaint
 0x71e910 FillRect
 0x71e914 IsWindowEnabled
 0x71e918 GetSysColor
 0x71e91c GetFocus
 0x71e920 DrawFocusRect
 0x71e924 SetCursor
 0x71e928 SetFocus
 0x71e92c SetCapture
 0x71e930 GetCapture
 0x71e934 wsprintfA
 0x71e938 GetUserObjectSecurity
 0x71e93c EnumDisplayDevicesW
 0x71e940 EnumDisplaySettingsExW
GDI32.dll
 0x71e144 GetDIBColorTable
 0x71e148 StretchBlt
 0x71e14c StartDocW
 0x71e150 AbortDoc
 0x71e154 EndDoc
 0x71e158 StartPage
 0x71e15c EndPage
 0x71e160 GetBitmapBits
 0x71e164 CreatePatternBrush
 0x71e168 Ellipse
 0x71e16c GetBitmapDimensionEx
 0x71e170 SetBitmapDimensionEx
 0x71e174 CreateBitmap
 0x71e178 Polyline
 0x71e17c DPtoLP
 0x71e180 GetDeviceCaps
 0x71e184 GetTextMetricsW
 0x71e188 GetCurrentObject
 0x71e18c GetBkColor
 0x71e190 GetTextColor
 0x71e194 Rectangle
 0x71e198 SetPixel
 0x71e19c LineTo
 0x71e1a0 MoveToEx
 0x71e1a4 RoundRect
 0x71e1a8 CreatePen
 0x71e1ac ExtTextOutW
 0x71e1b0 CreateRoundRectRgn
 0x71e1b4 BitBlt
 0x71e1b8 CreateCompatibleDC
 0x71e1bc CreateCompatibleBitmap
 0x71e1c0 SetViewportOrgEx
 0x71e1c4 CreateSolidBrush
 0x71e1c8 GetTextExtentExPointW
 0x71e1cc SaveDC
 0x71e1d0 RestoreDC
 0x71e1d4 SetBkColor
 0x71e1d8 TextOutW
 0x71e1dc GetTextExtentPoint32W
 0x71e1e0 SetBkMode
 0x71e1e4 SetTextColor
 0x71e1e8 GetStockObject
 0x71e1ec CreateFontIndirectW
 0x71e1f0 DeleteDC
 0x71e1f4 SelectObject
 0x71e1f8 GetObjectW
 0x71e1fc CreateDIBSection
 0x71e200 DeleteObject
 0x71e204 CreateDCW
 0x71e208 ExtEscape
COMDLG32.dll
 0x71e110 GetOpenFileNameW
 0x71e114 PrintDlgExW
 0x71e118 GetSaveFileNameW
ADVAPI32.dll
 0x71e000 RegQueryValueExW
 0x71e004 CryptGenRandom
 0x71e008 CryptReleaseContext
 0x71e00c CryptAcquireContextA
 0x71e010 RegEnumKeyExW
 0x71e014 RegQueryInfoKeyW
 0x71e018 SetSecurityDescriptorDacl
 0x71e01c InitializeSecurityDescriptor
 0x71e020 RegDeleteValueW
 0x71e024 RegCreateKeyExW
 0x71e028 RegCreateKeyW
 0x71e02c RegDeleteKeyW
 0x71e030 RegSetValueExW
 0x71e034 RegOpenKeyExW
 0x71e038 RegCloseKey
 0x71e03c GetTokenInformation
 0x71e040 OpenProcessToken
 0x71e044 GetUserNameW
 0x71e048 GetLengthSid
 0x71e04c InitializeAcl
 0x71e050 AddAccessAllowedAce
 0x71e054 SetSecurityDescriptorGroup
 0x71e058 AllocateAndInitializeSid
 0x71e05c FreeSid
 0x71e060 OpenSCManagerW
 0x71e064 EnumServicesStatusExW
 0x71e068 CloseServiceHandle
 0x71e06c RegEnumValueW
 0x71e070 RegQueryValueExA
 0x71e074 OpenServiceW
 0x71e078 QueryServiceConfigW
 0x71e07c EnumServicesStatusW
 0x71e080 OpenThreadToken
 0x71e084 ImpersonateSelf
 0x71e088 LookupAccountSidW
 0x71e08c GetSecurityDescriptorOwner
 0x71e090 IsValidSid
 0x71e094 LookupPrivilegeValueW
 0x71e098 AdjustTokenPrivileges
 0x71e09c GetSidSubAuthorityCount
 0x71e0a0 GetSidLengthRequired
 0x71e0a4 InitializeSid
 0x71e0a8 GetSidIdentifierAuthority
 0x71e0ac GetSidSubAuthority
 0x71e0b0 LsaOpenPolicy
 0x71e0b4 LsaQueryInformationPolicy
 0x71e0b8 LsaFreeMemory
 0x71e0bc CreateServiceA
 0x71e0c0 DeleteService
 0x71e0c4 OpenServiceA
 0x71e0c8 StartServiceA
 0x71e0cc ControlService
 0x71e0d0 OpenSCManagerA
 0x71e0d4 RegOpenKeyExA
 0x71e0d8 ConvertStringSidToSidW
 0x71e0dc RegLoadKeyW
 0x71e0e0 RegUnLoadKeyW
 0x71e0e4 RevertToSelf
 0x71e0e8 AccessCheck
 0x71e0ec IsValidSecurityDescriptor
 0x71e0f0 SetSecurityDescriptorOwner
SHELL32.dll
 0x71e674 DragQueryFileW
 0x71e678 DragFinish
 0x71e67c DuplicateIcon
 0x71e680 Shell_NotifyIconW
 0x71e684 ShellExecuteW
 0x71e688 DoEnvironmentSubstW
 0x71e68c SHGetSpecialFolderPathW
 0x71e690 ShellExecuteExW
ole32.dll
 0x71ea18 PropVariantClear
 0x71ea1c CoSetProxyBlanket
 0x71ea20 CoInitialize
 0x71ea24 CoTaskMemAlloc
 0x71ea28 CoInitializeSecurity
 0x71ea2c CoUninitialize
 0x71ea30 CoInitializeEx
 0x71ea34 CoTaskMemFree
 0x71ea38 CoCreateInstance
 0x71ea3c CoTaskMemRealloc
OLEAUT32.dll
 0x71e580 SafeArrayGetElement
 0x71e584 SystemTimeToVariantTime
 0x71e588 VariantInit
 0x71e58c VariantClear
 0x71e590 SysAllocString
 0x71e594 SysFreeString
 0x71e598 SafeArrayUnaccessData
 0x71e59c SysAllocStringLen
 0x71e5a0 VarUI4FromStr
 0x71e5a4 VariantChangeType
 0x71e5a8 VarBstrFromR8
 0x71e5ac SafeArrayGetUBound
 0x71e5b0 SafeArrayGetLBound
 0x71e5b4 SafeArrayGetElemsize
 0x71e5b8 SafeArrayGetVartype
 0x71e5bc SafeArrayAccessData
 0x71e5c0 SysAllocStringByteLen
 0x71e5c4 SysStringByteLen
 0x71e5c8 VariantCopy
 0x71e5cc VarUdateFromDate
 0x71e5d0 VariantTimeToSystemTime
 0x71e5d4 SysStringLen
RPCRT4.dll
 0x71e5fc UuidCreate
 0x71e600 UuidToStringW
 0x71e604 RpcStringFreeW
SETUPAPI.dll
 0x71e60c SetupDiCallClassInstaller
 0x71e610 CM_Get_DevNode_Registry_PropertyW
 0x71e614 CM_Open_DevNode_Key
 0x71e618 CM_Get_Parent
 0x71e61c SetupOpenFileQueue
 0x71e620 SetupScanFileQueueW
 0x71e624 SetupDiSetDeviceInstallParamsW
 0x71e628 SetupDiGetDeviceInstallParamsW
 0x71e62c SetupDiSetSelectedDriverW
 0x71e630 SetupDiEnumDeviceInfo
 0x71e634 SetupDiGetSelectedDriverW
 0x71e638 CM_Connect_MachineW
 0x71e63c CM_Locate_DevNode_ExW
 0x71e640 CM_Get_Child_Ex
 0x71e644 CM_Get_DevNode_Registry_Property_ExW
 0x71e648 CM_Get_Sibling_Ex
 0x71e64c SetupDiDestroyDriverInfoList
 0x71e650 SetupDiBuildDriverInfoList
 0x71e654 SetupDiOpenDevRegKey
 0x71e658 SetupDiGetDeviceInstanceIdW
 0x71e65c SetupDiGetDeviceRegistryPropertyW
 0x71e660 SetupDiGetDeviceRegistryPropertyA
 0x71e664 SetupCloseFileQueue
 0x71e668 SetupDiDestroyDeviceInfoList
 0x71e66c SetupDiGetClassDevsW
POWRPROF.dll
 0x71e5dc GetActivePwrScheme
 0x71e5e0 ReadPwrScheme
 0x71e5e4 GetPwrCapabilities
PSAPI.DLL
 0x71e5ec GetProcessImageFileNameW
 0x71e5f0 GetModuleFileNameExW
 0x71e5f4 GetProcessMemoryInfo
WINMM.dll
 0x71e998 waveOutMessage
 0x71e99c waveOutGetDevCapsW
 0x71e9a0 waveInGetDevCapsW
 0x71e9a4 waveOutGetNumDevs
 0x71e9a8 waveInGetNumDevs
 0x71e9ac waveInMessage
NETAPI32.dll
 0x71e56c NetWkstaGetInfo
 0x71e570 NetUserGetInfo
 0x71e574 NetUserModalsGet
 0x71e578 NetApiBufferFree
SHLWAPI.dll
 0x71e698 PathFileExistsW
 0x71e69c PathAppendW
 0x71e6a0 PathAddExtensionW
 0x71e6a4 PathRemoveFileSpecW
 0x71e6a8 PathIsDirectoryW
 0x71e6ac PathStripPathW
 0x71e6b0 PathMatchSpecW
 0x71e6b4 PathRemoveExtensionW
 0x71e6b8 PathCombineW
 0x71e6bc PathFindFileNameA
 0x71e6c0 PathCanonicalizeW
 0x71e6c4 StrFormatByteSizeW
 0x71e6c8 PathIsDirectoryEmptyW
MSIMG32.dll
 0x71e560 AlphaBlend
 0x71e564 TransparentBlt
COMCTL32.dll
 0x71e0f8 DestroyPropertySheetPage
 0x71e0fc _TrackMouseEvent
 0x71e100 InitCommonControlsEx
 0x71e104 PropertySheetW
 0x71e108 CreatePropertySheetPageW
CRYPT32.dll
 0x71e120 CryptQueryObject
 0x71e124 CertGetNameStringW
 0x71e128 CertCloseStore
 0x71e12c CryptMsgClose
 0x71e130 CertFindCertificateInStore
 0x71e134 CryptDecodeObject
 0x71e138 CryptMsgGetParam
 0x71e13c CertFreeCertificateContext
WINTRUST.dll
 0x71e9cc WinVerifyTrust
WS2_32.dll
 0x71e9d4 WSALookupServiceEnd
 0x71e9d8 WSAGetLastError
 0x71e9dc WSALookupServiceNextW
 0x71e9e0 WSACleanup
 0x71e9e4 WSAStartup
 0x71e9e8 WSALookupServiceBeginW
 0x71e9ec inet_addr
 0x71e9f0 htonl
 0x71e9f4 inet_ntoa
 0x71e9f8 WSAAddressToStringW
 0x71e9fc htons
 0x71ea00 getnameinfo
WINSPOOL.DRV
 0x71e9b4 EnumPrintersW
 0x71e9b8 None
 0x71e9bc ClosePrinter
 0x71e9c0 OpenPrinterW
 0x71e9c4 GetPrinterDriverW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure