ScreenShot
Created | 2025.02.03 10:00 | Machine | s1_win7_x6403 |
Filename | YLW.exe | ||
Type | PE32+ executable (GUI) x86-64, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | |||
VT API (file) | 54 detected (AIDetectMalware, Malicious, score, Ghanarava, Barys, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, high confidence, SpywareX, TrojanPSW, jyhgbp, 7grKvsOYqUS, AGEN, Static AI, Suspicious PE, Detected, LucaStealer, Eldorado, R550345, Artemis, Chgt, Gencirc, +R+JClbkPWY, susgen, Lumma) | ||
md5 | 300f993df799e263d6d1316cbf643450 | ||
sha256 | c6d628c4f366dfd4bf3a79c3d71c014927c2c876fcfc7f23398da18dd6653f00 | ||
ssdeep | 49152:x9o/96ps/rVviNeksFYYz57fxwGGVH0SQ+TURvL5q7WM+YjP1vhDDiHnjYQ1wlD8:/o/FiUYc5oM5q6UoV1dzatI | ||
imphash | a53eab4cfcf5a565bb2e6568e8506281 | ||
impfuzzy | 96:S7zyTxK9Wc6SNX3nn4ZazaH5fcg+PjQWOHp+DFHT9Wv9sNgS50sgG6T:SiaWOHn4ZazakQWyKFHxWFCGsgG6T |
Network IP location
Signature (1cnts)
Level | Description |
---|---|
danger | File has been identified by 54 AntiVirus engines on VirusTotal as malicious |
Rules (7cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
kernel32.dll
0x1402a42d8 GetFileInformationByHandle
0x1402a42e0 GetModuleHandleA
0x1402a42e8 GetCurrentThread
0x1402a42f0 GetStdHandle
0x1402a42f8 GetConsoleMode
0x1402a4300 WaitForSingleObject
0x1402a4308 WriteConsoleW
0x1402a4310 WaitForSingleObjectEx
0x1402a4318 CreateMutexA
0x1402a4320 ReleaseMutex
0x1402a4328 GetEnvironmentVariableW
0x1402a4330 RtlLookupFunctionEntry
0x1402a4338 GetModuleHandleW
0x1402a4340 FormatMessageW
0x1402a4348 GetTempPathW
0x1402a4350 GetModuleFileNameW
0x1402a4358 CreateFileW
0x1402a4360 GetFileInformationByHandleEx
0x1402a4368 GlobalAlloc
0x1402a4370 SetFilePointerEx
0x1402a4378 MultiByteToWideChar
0x1402a4380 CreateDirectoryW
0x1402a4388 FindFirstFileW
0x1402a4390 FindClose
0x1402a4398 WideCharToMultiByte
0x1402a43a0 GlobalSize
0x1402a43a8 GlobalLock
0x1402a43b0 ReleaseSRWLockExclusive
0x1402a43b8 GetEnvironmentStringsW
0x1402a43c0 FreeEnvironmentStringsW
0x1402a43c8 CompareStringOrdinal
0x1402a43d0 GetSystemDirectoryW
0x1402a43d8 GetWindowsDirectoryW
0x1402a43e0 CreateProcessW
0x1402a43e8 GetFileAttributesW
0x1402a43f0 DuplicateHandle
0x1402a43f8 GetCurrentProcessId
0x1402a4400 CreateNamedPipeW
0x1402a4408 CreateThread
0x1402a4410 ReadFileEx
0x1402a4418 SleepEx
0x1402a4420 WriteFileEx
0x1402a4428 SetFileCompletionNotificationModes
0x1402a4430 ExitProcess
0x1402a4438 QueryPerformanceCounter
0x1402a4440 QueryPerformanceFrequency
0x1402a4448 GetSystemTimeAsFileTime
0x1402a4450 GetCurrentDirectoryW
0x1402a4458 RtlCaptureContext
0x1402a4460 AcquireSRWLockShared
0x1402a4468 ReleaseSRWLockShared
0x1402a4470 CopyFileExW
0x1402a4478 SleepConditionVariableSRW
0x1402a4480 SetHandleInformation
0x1402a4488 WakeConditionVariable
0x1402a4490 PostQueuedCompletionStatus
0x1402a4498 CreateIoCompletionPort
0x1402a44a0 TryAcquireSRWLockExclusive
0x1402a44a8 GetFinalPathNameByHandleW
0x1402a44b0 SetLastError
0x1402a44b8 GetQueuedCompletionStatusEx
0x1402a44c0 UnhandledExceptionFilter
0x1402a44c8 SwitchToThread
0x1402a44d0 SetUnhandledExceptionFilter
0x1402a44d8 GlobalUnlock
0x1402a44e0 GlobalFree
0x1402a44e8 GetProcessHeap
0x1402a44f0 HeapAlloc
0x1402a44f8 SetThreadStackGuarantee
0x1402a4500 FileTimeToSystemTime
0x1402a4508 SystemTimeToTzSpecificLocalTime
0x1402a4510 SystemTimeToFileTime
0x1402a4518 GetTimeZoneInformation
0x1402a4520 RtlVirtualUnwind
0x1402a4528 FlushFileBuffers
0x1402a4530 GetTickCount
0x1402a4538 MapViewOfFile
0x1402a4540 CreateFileMappingW
0x1402a4548 FormatMessageA
0x1402a4550 GetSystemTime
0x1402a4558 FreeLibrary
0x1402a4560 GetFileSize
0x1402a4568 LockFileEx
0x1402a4570 LocalFree
0x1402a4578 UnlockFile
0x1402a4580 HeapDestroy
0x1402a4588 HeapCompact
0x1402a4590 LoadLibraryW
0x1402a4598 DeleteFileW
0x1402a45a0 DeleteFileA
0x1402a45a8 CreateFileA
0x1402a45b0 FlushViewOfFile
0x1402a45b8 OutputDebugStringW
0x1402a45c0 GetFileAttributesExW
0x1402a45c8 GetFileAttributesA
0x1402a45d0 GetDiskFreeSpaceA
0x1402a45d8 GetTempPathA
0x1402a45e0 HeapSize
0x1402a45e8 HeapValidate
0x1402a45f0 UnmapViewOfFile
0x1402a45f8 CreateMutexW
0x1402a4600 UnlockFileEx
0x1402a4608 SetEndOfFile
0x1402a4610 GetFullPathNameA
0x1402a4618 SetFilePointer
0x1402a4620 LockFile
0x1402a4628 OutputDebugStringA
0x1402a4630 GetDiskFreeSpaceW
0x1402a4638 WriteFile
0x1402a4640 HeapCreate
0x1402a4648 ReadFile
0x1402a4650 AreFileApisANSI
0x1402a4658 InitializeCriticalSection
0x1402a4660 EnterCriticalSection
0x1402a4668 LeaveCriticalSection
0x1402a4670 TryEnterCriticalSection
0x1402a4678 DeleteCriticalSection
0x1402a4680 GetCurrentThreadId
0x1402a4688 AddVectoredExceptionHandler
0x1402a4690 GetCurrentProcess
0x1402a4698 GetProcAddress
0x1402a46a0 LoadLibraryA
0x1402a46a8 WakeAllConditionVariable
0x1402a46b0 HeapReAlloc
0x1402a46b8 GetSystemInfo
0x1402a46c0 GetLastError
0x1402a46c8 Sleep
0x1402a46d0 FindNextFileW
0x1402a46d8 TerminateProcess
0x1402a46e0 CloseHandle
0x1402a46e8 AcquireSRWLockExclusive
0x1402a46f0 IsProcessorFeaturePresent
0x1402a46f8 InitializeSListHead
0x1402a4700 IsDebuggerPresent
0x1402a4708 GetFullPathNameW
0x1402a4710 HeapFree
oleaut32.dll
0x1402a4770 SafeArrayDestroy
0x1402a4778 SafeArrayAccessData
0x1402a4780 SafeArrayGetUBound
0x1402a4788 SafeArrayGetLBound
0x1402a4790 VariantClear
0x1402a4798 SysFreeString
0x1402a47a0 SafeArrayUnaccessData
0x1402a47a8 SysAllocStringLen
ws2_32.dll
0x1402a4858 ioctlsocket
0x1402a4860 WSASocketW
0x1402a4868 ind
0x1402a4870 listen
0x1402a4878 WSASend
0x1402a4880 accept
0x1402a4888 setsockopt
0x1402a4890 connect
0x1402a4898 getaddrinfo
0x1402a48a0 getsockopt
0x1402a48a8 WSAIoctl
0x1402a48b0 freeaddrinfo
0x1402a48b8 WSAStartup
0x1402a48c0 WSACleanup
0x1402a48c8 getsockname
0x1402a48d0 WSAGetLastError
0x1402a48d8 getpeername
0x1402a48e0 recv
0x1402a48e8 closesocket
0x1402a48f0 send
0x1402a48f8 shutdown
0x1402a4900 socket
crypt32.dll
0x1402a4210 CryptUnprotectData
0x1402a4218 CertDuplicateCertificateContext
0x1402a4220 CertGetCertificateChain
0x1402a4228 CertVerifyCertificateChainPolicy
0x1402a4230 CertFreeCertificateChain
0x1402a4238 CertOpenStore
0x1402a4240 CertFreeCertificateContext
0x1402a4248 CertDuplicateCertificateChain
0x1402a4250 CertAddCertificateContextToStore
0x1402a4258 CertEnumCertificatesInStore
0x1402a4260 CertCloseStore
0x1402a4268 CertDuplicateStore
advapi32.dll
0x1402a4050 AllocateAndInitializeSid
0x1402a4058 FreeSid
0x1402a4060 CheckTokenMembership
0x1402a4068 SystemFunction036
0x1402a4070 RegQueryValueExW
0x1402a4078 RegOpenKeyExW
0x1402a4080 RegCloseKey
crypt.dll
0x1402a4200 BCryptGenRandom
user32.dll
0x1402a4810 EnumDisplaySettingsExW
0x1402a4818 SetClipboardData
0x1402a4820 EmptyClipboard
0x1402a4828 CloseClipboard
0x1402a4830 GetClipboardData
0x1402a4838 OpenClipboard
0x1402a4840 GetMonitorInfoW
0x1402a4848 EnumDisplayMonitors
ntdll.dll
0x1402a4720 NtCreateFile
0x1402a4728 NtCancelIoFileEx
0x1402a4730 NtDeviceIoControlFile
0x1402a4738 RtlNtStatusToDosError
secur32.dll
0x1402a47b8 InitializeSecurityContextW
0x1402a47c0 QueryContextAttributesW
0x1402a47c8 FreeContextBuffer
0x1402a47d0 DeleteSecurityContext
0x1402a47d8 EncryptMessage
0x1402a47e0 AcceptSecurityContext
0x1402a47e8 FreeCredentialsHandle
0x1402a47f0 AcquireCredentialsHandleA
0x1402a47f8 ApplyControlToken
0x1402a4800 DecryptMessage
gdi32.dll
0x1402a4278 GetDeviceCaps
0x1402a4280 DeleteDC
0x1402a4288 DeleteObject
0x1402a4290 CreateCompatibleDC
0x1402a4298 CreateCompatibleBitmap
0x1402a42a0 SelectObject
0x1402a42a8 SetStretchBltMode
0x1402a42b0 StretchBlt
0x1402a42b8 GetDIBits
0x1402a42c0 GetObjectW
0x1402a42c8 CreateDCW
ole32.dll
0x1402a4748 CoSetProxyBlanket
0x1402a4750 CoCreateInstance
0x1402a4758 CoInitializeSecurity
0x1402a4760 CoInitializeEx
VCRUNTIME140.dll
0x1402a4000 strrchr
0x1402a4008 memmove
0x1402a4010 memset
0x1402a4018 memcpy
0x1402a4020 memcmp
0x1402a4028 __C_specific_handler
0x1402a4030 __current_exception
0x1402a4038 __current_exception_context
0x1402a4040 __CxxFrameHandler3
api-ms-win-crt-string-l1-1-0.dll
0x1402a41b0 strcmp
0x1402a41b8 strcspn
0x1402a41c0 strlen
0x1402a41c8 strncmp
api-ms-win-crt-utility-l1-1-0.dll
0x1402a41e8 qsort
0x1402a41f0 _rotl64
api-ms-win-crt-heap-l1-1-0.dll
0x1402a4090 realloc
0x1402a4098 _set_new_mode
0x1402a40a0 free
0x1402a40a8 _msize
0x1402a40b0 malloc
api-ms-win-crt-time-l1-1-0.dll
0x1402a41d8 _localtime64_s
api-ms-win-crt-math-l1-1-0.dll
0x1402a40d0 _dclass
0x1402a40d8 log
0x1402a40e0 __setusermatherr
api-ms-win-crt-runtime-l1-1-0.dll
0x1402a40f0 _endthreadex
0x1402a40f8 __p___argv
0x1402a4100 _beginthreadex
0x1402a4108 _seh_filter_exe
0x1402a4110 _initterm
0x1402a4118 _cexit
0x1402a4120 _c_exit
0x1402a4128 _exit
0x1402a4130 _register_thread_local_exe_atexit_callback
0x1402a4138 _configure_narrow_argv
0x1402a4140 _initialize_narrow_environment
0x1402a4148 _get_initial_narrow_environment
0x1402a4150 _initialize_onexit_table
0x1402a4158 _set_app_type
0x1402a4160 terminate
0x1402a4168 exit
0x1402a4170 _crt_atexit
0x1402a4178 __p___argc
0x1402a4180 _register_onexit_function
0x1402a4188 _initterm_e
api-ms-win-crt-stdio-l1-1-0.dll
0x1402a4198 __p__commode
0x1402a41a0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
0x1402a40c0 _configthreadlocale
EAT(Export Address Table) is none
kernel32.dll
0x1402a42d8 GetFileInformationByHandle
0x1402a42e0 GetModuleHandleA
0x1402a42e8 GetCurrentThread
0x1402a42f0 GetStdHandle
0x1402a42f8 GetConsoleMode
0x1402a4300 WaitForSingleObject
0x1402a4308 WriteConsoleW
0x1402a4310 WaitForSingleObjectEx
0x1402a4318 CreateMutexA
0x1402a4320 ReleaseMutex
0x1402a4328 GetEnvironmentVariableW
0x1402a4330 RtlLookupFunctionEntry
0x1402a4338 GetModuleHandleW
0x1402a4340 FormatMessageW
0x1402a4348 GetTempPathW
0x1402a4350 GetModuleFileNameW
0x1402a4358 CreateFileW
0x1402a4360 GetFileInformationByHandleEx
0x1402a4368 GlobalAlloc
0x1402a4370 SetFilePointerEx
0x1402a4378 MultiByteToWideChar
0x1402a4380 CreateDirectoryW
0x1402a4388 FindFirstFileW
0x1402a4390 FindClose
0x1402a4398 WideCharToMultiByte
0x1402a43a0 GlobalSize
0x1402a43a8 GlobalLock
0x1402a43b0 ReleaseSRWLockExclusive
0x1402a43b8 GetEnvironmentStringsW
0x1402a43c0 FreeEnvironmentStringsW
0x1402a43c8 CompareStringOrdinal
0x1402a43d0 GetSystemDirectoryW
0x1402a43d8 GetWindowsDirectoryW
0x1402a43e0 CreateProcessW
0x1402a43e8 GetFileAttributesW
0x1402a43f0 DuplicateHandle
0x1402a43f8 GetCurrentProcessId
0x1402a4400 CreateNamedPipeW
0x1402a4408 CreateThread
0x1402a4410 ReadFileEx
0x1402a4418 SleepEx
0x1402a4420 WriteFileEx
0x1402a4428 SetFileCompletionNotificationModes
0x1402a4430 ExitProcess
0x1402a4438 QueryPerformanceCounter
0x1402a4440 QueryPerformanceFrequency
0x1402a4448 GetSystemTimeAsFileTime
0x1402a4450 GetCurrentDirectoryW
0x1402a4458 RtlCaptureContext
0x1402a4460 AcquireSRWLockShared
0x1402a4468 ReleaseSRWLockShared
0x1402a4470 CopyFileExW
0x1402a4478 SleepConditionVariableSRW
0x1402a4480 SetHandleInformation
0x1402a4488 WakeConditionVariable
0x1402a4490 PostQueuedCompletionStatus
0x1402a4498 CreateIoCompletionPort
0x1402a44a0 TryAcquireSRWLockExclusive
0x1402a44a8 GetFinalPathNameByHandleW
0x1402a44b0 SetLastError
0x1402a44b8 GetQueuedCompletionStatusEx
0x1402a44c0 UnhandledExceptionFilter
0x1402a44c8 SwitchToThread
0x1402a44d0 SetUnhandledExceptionFilter
0x1402a44d8 GlobalUnlock
0x1402a44e0 GlobalFree
0x1402a44e8 GetProcessHeap
0x1402a44f0 HeapAlloc
0x1402a44f8 SetThreadStackGuarantee
0x1402a4500 FileTimeToSystemTime
0x1402a4508 SystemTimeToTzSpecificLocalTime
0x1402a4510 SystemTimeToFileTime
0x1402a4518 GetTimeZoneInformation
0x1402a4520 RtlVirtualUnwind
0x1402a4528 FlushFileBuffers
0x1402a4530 GetTickCount
0x1402a4538 MapViewOfFile
0x1402a4540 CreateFileMappingW
0x1402a4548 FormatMessageA
0x1402a4550 GetSystemTime
0x1402a4558 FreeLibrary
0x1402a4560 GetFileSize
0x1402a4568 LockFileEx
0x1402a4570 LocalFree
0x1402a4578 UnlockFile
0x1402a4580 HeapDestroy
0x1402a4588 HeapCompact
0x1402a4590 LoadLibraryW
0x1402a4598 DeleteFileW
0x1402a45a0 DeleteFileA
0x1402a45a8 CreateFileA
0x1402a45b0 FlushViewOfFile
0x1402a45b8 OutputDebugStringW
0x1402a45c0 GetFileAttributesExW
0x1402a45c8 GetFileAttributesA
0x1402a45d0 GetDiskFreeSpaceA
0x1402a45d8 GetTempPathA
0x1402a45e0 HeapSize
0x1402a45e8 HeapValidate
0x1402a45f0 UnmapViewOfFile
0x1402a45f8 CreateMutexW
0x1402a4600 UnlockFileEx
0x1402a4608 SetEndOfFile
0x1402a4610 GetFullPathNameA
0x1402a4618 SetFilePointer
0x1402a4620 LockFile
0x1402a4628 OutputDebugStringA
0x1402a4630 GetDiskFreeSpaceW
0x1402a4638 WriteFile
0x1402a4640 HeapCreate
0x1402a4648 ReadFile
0x1402a4650 AreFileApisANSI
0x1402a4658 InitializeCriticalSection
0x1402a4660 EnterCriticalSection
0x1402a4668 LeaveCriticalSection
0x1402a4670 TryEnterCriticalSection
0x1402a4678 DeleteCriticalSection
0x1402a4680 GetCurrentThreadId
0x1402a4688 AddVectoredExceptionHandler
0x1402a4690 GetCurrentProcess
0x1402a4698 GetProcAddress
0x1402a46a0 LoadLibraryA
0x1402a46a8 WakeAllConditionVariable
0x1402a46b0 HeapReAlloc
0x1402a46b8 GetSystemInfo
0x1402a46c0 GetLastError
0x1402a46c8 Sleep
0x1402a46d0 FindNextFileW
0x1402a46d8 TerminateProcess
0x1402a46e0 CloseHandle
0x1402a46e8 AcquireSRWLockExclusive
0x1402a46f0 IsProcessorFeaturePresent
0x1402a46f8 InitializeSListHead
0x1402a4700 IsDebuggerPresent
0x1402a4708 GetFullPathNameW
0x1402a4710 HeapFree
oleaut32.dll
0x1402a4770 SafeArrayDestroy
0x1402a4778 SafeArrayAccessData
0x1402a4780 SafeArrayGetUBound
0x1402a4788 SafeArrayGetLBound
0x1402a4790 VariantClear
0x1402a4798 SysFreeString
0x1402a47a0 SafeArrayUnaccessData
0x1402a47a8 SysAllocStringLen
ws2_32.dll
0x1402a4858 ioctlsocket
0x1402a4860 WSASocketW
0x1402a4868 ind
0x1402a4870 listen
0x1402a4878 WSASend
0x1402a4880 accept
0x1402a4888 setsockopt
0x1402a4890 connect
0x1402a4898 getaddrinfo
0x1402a48a0 getsockopt
0x1402a48a8 WSAIoctl
0x1402a48b0 freeaddrinfo
0x1402a48b8 WSAStartup
0x1402a48c0 WSACleanup
0x1402a48c8 getsockname
0x1402a48d0 WSAGetLastError
0x1402a48d8 getpeername
0x1402a48e0 recv
0x1402a48e8 closesocket
0x1402a48f0 send
0x1402a48f8 shutdown
0x1402a4900 socket
crypt32.dll
0x1402a4210 CryptUnprotectData
0x1402a4218 CertDuplicateCertificateContext
0x1402a4220 CertGetCertificateChain
0x1402a4228 CertVerifyCertificateChainPolicy
0x1402a4230 CertFreeCertificateChain
0x1402a4238 CertOpenStore
0x1402a4240 CertFreeCertificateContext
0x1402a4248 CertDuplicateCertificateChain
0x1402a4250 CertAddCertificateContextToStore
0x1402a4258 CertEnumCertificatesInStore
0x1402a4260 CertCloseStore
0x1402a4268 CertDuplicateStore
advapi32.dll
0x1402a4050 AllocateAndInitializeSid
0x1402a4058 FreeSid
0x1402a4060 CheckTokenMembership
0x1402a4068 SystemFunction036
0x1402a4070 RegQueryValueExW
0x1402a4078 RegOpenKeyExW
0x1402a4080 RegCloseKey
crypt.dll
0x1402a4200 BCryptGenRandom
user32.dll
0x1402a4810 EnumDisplaySettingsExW
0x1402a4818 SetClipboardData
0x1402a4820 EmptyClipboard
0x1402a4828 CloseClipboard
0x1402a4830 GetClipboardData
0x1402a4838 OpenClipboard
0x1402a4840 GetMonitorInfoW
0x1402a4848 EnumDisplayMonitors
ntdll.dll
0x1402a4720 NtCreateFile
0x1402a4728 NtCancelIoFileEx
0x1402a4730 NtDeviceIoControlFile
0x1402a4738 RtlNtStatusToDosError
secur32.dll
0x1402a47b8 InitializeSecurityContextW
0x1402a47c0 QueryContextAttributesW
0x1402a47c8 FreeContextBuffer
0x1402a47d0 DeleteSecurityContext
0x1402a47d8 EncryptMessage
0x1402a47e0 AcceptSecurityContext
0x1402a47e8 FreeCredentialsHandle
0x1402a47f0 AcquireCredentialsHandleA
0x1402a47f8 ApplyControlToken
0x1402a4800 DecryptMessage
gdi32.dll
0x1402a4278 GetDeviceCaps
0x1402a4280 DeleteDC
0x1402a4288 DeleteObject
0x1402a4290 CreateCompatibleDC
0x1402a4298 CreateCompatibleBitmap
0x1402a42a0 SelectObject
0x1402a42a8 SetStretchBltMode
0x1402a42b0 StretchBlt
0x1402a42b8 GetDIBits
0x1402a42c0 GetObjectW
0x1402a42c8 CreateDCW
ole32.dll
0x1402a4748 CoSetProxyBlanket
0x1402a4750 CoCreateInstance
0x1402a4758 CoInitializeSecurity
0x1402a4760 CoInitializeEx
VCRUNTIME140.dll
0x1402a4000 strrchr
0x1402a4008 memmove
0x1402a4010 memset
0x1402a4018 memcpy
0x1402a4020 memcmp
0x1402a4028 __C_specific_handler
0x1402a4030 __current_exception
0x1402a4038 __current_exception_context
0x1402a4040 __CxxFrameHandler3
api-ms-win-crt-string-l1-1-0.dll
0x1402a41b0 strcmp
0x1402a41b8 strcspn
0x1402a41c0 strlen
0x1402a41c8 strncmp
api-ms-win-crt-utility-l1-1-0.dll
0x1402a41e8 qsort
0x1402a41f0 _rotl64
api-ms-win-crt-heap-l1-1-0.dll
0x1402a4090 realloc
0x1402a4098 _set_new_mode
0x1402a40a0 free
0x1402a40a8 _msize
0x1402a40b0 malloc
api-ms-win-crt-time-l1-1-0.dll
0x1402a41d8 _localtime64_s
api-ms-win-crt-math-l1-1-0.dll
0x1402a40d0 _dclass
0x1402a40d8 log
0x1402a40e0 __setusermatherr
api-ms-win-crt-runtime-l1-1-0.dll
0x1402a40f0 _endthreadex
0x1402a40f8 __p___argv
0x1402a4100 _beginthreadex
0x1402a4108 _seh_filter_exe
0x1402a4110 _initterm
0x1402a4118 _cexit
0x1402a4120 _c_exit
0x1402a4128 _exit
0x1402a4130 _register_thread_local_exe_atexit_callback
0x1402a4138 _configure_narrow_argv
0x1402a4140 _initialize_narrow_environment
0x1402a4148 _get_initial_narrow_environment
0x1402a4150 _initialize_onexit_table
0x1402a4158 _set_app_type
0x1402a4160 terminate
0x1402a4168 exit
0x1402a4170 _crt_atexit
0x1402a4178 __p___argc
0x1402a4180 _register_onexit_function
0x1402a4188 _initterm_e
api-ms-win-crt-stdio-l1-1-0.dll
0x1402a4198 __p__commode
0x1402a41a0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
0x1402a40c0 _configthreadlocale
EAT(Export Address Table) is none