ScreenShot
Created | 2025.02.05 11:28 | Machine | s1_win7_x6403 |
Filename | black.exe | ||
Type | PE32+ executable (GUI) x86-64, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : mailcious | ||
VT API (file) | 52 detected (Malicious, score, Ghanarava, Barys, Unsafe, confidence, 100%, Attribute, HighConfidence, high confidence, SpywareX, TrojanPSW, JmfshrYaWwS, Static AI, Suspicious PE, Detected, RustyStealer, Eldorado, R550345, Artemis, Chgt, Gencirc, susgen, Luca) | ||
md5 | 740b99fb0515f52ae740be4abce39747 | ||
sha256 | 2fd0d3eb162542eb110527cbb3405ce49c674e37779ec1dfa1937d9ca85f2438 | ||
ssdeep | 49152:tUPuL07z5r7QyUpmFwEaAvsvzWeAqkONWvQU7pzP8UIz/Op4977Y+3JPEEVXC8ub:fL0KyvwRAGU7VBGmsEjR/qO | ||
imphash | 38c4cd74b500cfc8c22c9298e1a309c6 | ||
impfuzzy | 96:SQKRTxK9WZ6Sfnn4ZazaH5fcg+PxXPcWqHp+so5HT9Wv9sNgSqEfMJdd:SRaWLn4ZazaE/cW2G5HxWFCqeMJdd |
Network IP location
Signature (2cnts)
Level | Description |
---|---|
danger | File has been identified by 52 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
Rules (7cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
PE API
IAT(Import Address Table) Library
kernel32.dll
0x1402a32e8 GetFileInformationByHandle
0x1402a32f0 GetModuleHandleA
0x1402a32f8 GetCurrentThread
0x1402a3300 GetStdHandle
0x1402a3308 GetConsoleMode
0x1402a3310 WaitForSingleObject
0x1402a3318 WriteConsoleW
0x1402a3320 WaitForSingleObjectEx
0x1402a3328 CreateMutexA
0x1402a3330 ReleaseMutex
0x1402a3338 GetEnvironmentVariableW
0x1402a3340 RtlLookupFunctionEntry
0x1402a3348 GetModuleHandleW
0x1402a3350 FormatMessageW
0x1402a3358 GetTempPathW
0x1402a3360 GetModuleFileNameW
0x1402a3368 CreateFileW
0x1402a3370 GlobalAlloc
0x1402a3378 GetFullPathNameW
0x1402a3380 MultiByteToWideChar
0x1402a3388 FindNextFileW
0x1402a3390 CreateDirectoryW
0x1402a3398 FindFirstFileW
0x1402a33a0 FindClose
0x1402a33a8 WideCharToMultiByte
0x1402a33b0 GlobalSize
0x1402a33b8 GlobalLock
0x1402a33c0 Sleep
0x1402a33c8 GetEnvironmentStringsW
0x1402a33d0 FreeEnvironmentStringsW
0x1402a33d8 CompareStringOrdinal
0x1402a33e0 GetSystemDirectoryW
0x1402a33e8 GetWindowsDirectoryW
0x1402a33f0 CreateProcessW
0x1402a33f8 GetFileAttributesW
0x1402a3400 DuplicateHandle
0x1402a3408 GetCurrentProcessId
0x1402a3410 CreateNamedPipeW
0x1402a3418 CreateThread
0x1402a3420 ReadFileEx
0x1402a3428 SleepEx
0x1402a3430 WriteFileEx
0x1402a3438 ReleaseSRWLockExclusive
0x1402a3440 ExitProcess
0x1402a3448 QueryPerformanceCounter
0x1402a3450 QueryPerformanceFrequency
0x1402a3458 GetSystemTimeAsFileTime
0x1402a3460 GetCurrentDirectoryW
0x1402a3468 RtlCaptureContext
0x1402a3470 AcquireSRWLockShared
0x1402a3478 ReleaseSRWLockShared
0x1402a3480 CopyFileExW
0x1402a3488 SleepConditionVariableSRW
0x1402a3490 SetHandleInformation
0x1402a3498 WakeConditionVariable
0x1402a34a0 PostQueuedCompletionStatus
0x1402a34a8 SetFileCompletionNotificationModes
0x1402a34b0 CreateIoCompletionPort
0x1402a34b8 TryAcquireSRWLockExclusive
0x1402a34c0 GetFinalPathNameByHandleW
0x1402a34c8 SetLastError
0x1402a34d0 GetQueuedCompletionStatusEx
0x1402a34d8 UnhandledExceptionFilter
0x1402a34e0 SwitchToThread
0x1402a34e8 SetUnhandledExceptionFilter
0x1402a34f0 GlobalUnlock
0x1402a34f8 GlobalFree
0x1402a3500 GetProcessHeap
0x1402a3508 HeapAlloc
0x1402a3510 FileTimeToSystemTime
0x1402a3518 SystemTimeToTzSpecificLocalTime
0x1402a3520 SystemTimeToFileTime
0x1402a3528 GetTimeZoneInformation
0x1402a3530 RtlVirtualUnwind
0x1402a3538 FlushFileBuffers
0x1402a3540 GetTickCount
0x1402a3548 MapViewOfFile
0x1402a3550 CreateFileMappingW
0x1402a3558 FormatMessageA
0x1402a3560 GetSystemTime
0x1402a3568 FreeLibrary
0x1402a3570 GetFileSize
0x1402a3578 LockFileEx
0x1402a3580 LocalFree
0x1402a3588 UnlockFile
0x1402a3590 HeapDestroy
0x1402a3598 HeapCompact
0x1402a35a0 LoadLibraryW
0x1402a35a8 DeleteFileW
0x1402a35b0 DeleteFileA
0x1402a35b8 CreateFileA
0x1402a35c0 FlushViewOfFile
0x1402a35c8 OutputDebugStringW
0x1402a35d0 GetFileAttributesExW
0x1402a35d8 GetFileAttributesA
0x1402a35e0 GetDiskFreeSpaceA
0x1402a35e8 GetTempPathA
0x1402a35f0 HeapSize
0x1402a35f8 HeapValidate
0x1402a3600 UnmapViewOfFile
0x1402a3608 CreateMutexW
0x1402a3610 UnlockFileEx
0x1402a3618 SetEndOfFile
0x1402a3620 GetFullPathNameA
0x1402a3628 SetFilePointer
0x1402a3630 LockFile
0x1402a3638 OutputDebugStringA
0x1402a3640 GetDiskFreeSpaceW
0x1402a3648 WriteFile
0x1402a3650 HeapCreate
0x1402a3658 ReadFile
0x1402a3660 AreFileApisANSI
0x1402a3668 InitializeCriticalSection
0x1402a3670 EnterCriticalSection
0x1402a3678 LeaveCriticalSection
0x1402a3680 TryEnterCriticalSection
0x1402a3688 DeleteCriticalSection
0x1402a3690 GetCurrentThreadId
0x1402a3698 SetThreadStackGuarantee
0x1402a36a0 AddVectoredExceptionHandler
0x1402a36a8 GetCurrentProcess
0x1402a36b0 GetProcAddress
0x1402a36b8 LoadLibraryA
0x1402a36c0 WakeAllConditionVariable
0x1402a36c8 HeapReAlloc
0x1402a36d0 GetLastError
0x1402a36d8 GetSystemInfo
0x1402a36e0 SetFilePointerEx
0x1402a36e8 TerminateProcess
0x1402a36f0 CloseHandle
0x1402a36f8 AcquireSRWLockExclusive
0x1402a3700 IsProcessorFeaturePresent
0x1402a3708 InitializeSListHead
0x1402a3710 IsDebuggerPresent
0x1402a3718 GetFileInformationByHandleEx
0x1402a3720 HeapFree
oleaut32.dll
0x1402a3780 SafeArrayDestroy
0x1402a3788 SafeArrayAccessData
0x1402a3790 SafeArrayGetUBound
0x1402a3798 SafeArrayGetLBound
0x1402a37a0 VariantClear
0x1402a37a8 SysFreeString
0x1402a37b0 SafeArrayUnaccessData
0x1402a37b8 SysAllocStringLen
ws2_32.dll
0x1402a3868 ioctlsocket
0x1402a3870 WSASocketW
0x1402a3878 ind
0x1402a3880 listen
0x1402a3888 WSASend
0x1402a3890 accept
0x1402a3898 setsockopt
0x1402a38a0 connect
0x1402a38a8 getaddrinfo
0x1402a38b0 getsockopt
0x1402a38b8 WSAIoctl
0x1402a38c0 freeaddrinfo
0x1402a38c8 WSAStartup
0x1402a38d0 WSACleanup
0x1402a38d8 getsockname
0x1402a38e0 WSAGetLastError
0x1402a38e8 getpeername
0x1402a38f0 recv
0x1402a38f8 closesocket
0x1402a3900 send
0x1402a3908 shutdown
0x1402a3910 socket
crypt32.dll
0x1402a3220 CertFreeCertificateContext
0x1402a3228 CertFreeCertificateChain
0x1402a3230 CertCloseStore
0x1402a3238 CertDuplicateStore
0x1402a3240 CertDuplicateCertificateContext
0x1402a3248 CertVerifyCertificateChainPolicy
0x1402a3250 CryptUnprotectData
0x1402a3258 CertGetCertificateChain
0x1402a3260 CertAddCertificateContextToStore
0x1402a3268 CertEnumCertificatesInStore
0x1402a3270 CertOpenStore
0x1402a3278 CertDuplicateCertificateChain
advapi32.dll
0x1402a3050 RegCreateKeyExA
0x1402a3058 RegSetValueExA
0x1402a3060 AllocateAndInitializeSid
0x1402a3068 FreeSid
0x1402a3070 CheckTokenMembership
0x1402a3078 RegQueryValueExW
0x1402a3080 RegCloseKey
0x1402a3088 SystemFunction036
0x1402a3090 RegOpenKeyExW
crypt.dll
0x1402a3210 BCryptGenRandom
user32.dll
0x1402a3820 EnumDisplaySettingsExW
0x1402a3828 SetClipboardData
0x1402a3830 EmptyClipboard
0x1402a3838 CloseClipboard
0x1402a3840 GetClipboardData
0x1402a3848 OpenClipboard
0x1402a3850 GetMonitorInfoW
0x1402a3858 EnumDisplayMonitors
ntdll.dll
0x1402a3730 NtCreateFile
0x1402a3738 NtCancelIoFileEx
0x1402a3740 NtDeviceIoControlFile
0x1402a3748 RtlNtStatusToDosError
secur32.dll
0x1402a37c8 InitializeSecurityContextW
0x1402a37d0 QueryContextAttributesW
0x1402a37d8 FreeContextBuffer
0x1402a37e0 DeleteSecurityContext
0x1402a37e8 EncryptMessage
0x1402a37f0 AcceptSecurityContext
0x1402a37f8 FreeCredentialsHandle
0x1402a3800 AcquireCredentialsHandleA
0x1402a3808 ApplyControlToken
0x1402a3810 DecryptMessage
gdi32.dll
0x1402a3288 GetDeviceCaps
0x1402a3290 DeleteDC
0x1402a3298 DeleteObject
0x1402a32a0 CreateCompatibleDC
0x1402a32a8 CreateCompatibleBitmap
0x1402a32b0 SelectObject
0x1402a32b8 SetStretchBltMode
0x1402a32c0 StretchBlt
0x1402a32c8 GetDIBits
0x1402a32d0 GetObjectW
0x1402a32d8 CreateDCW
ole32.dll
0x1402a3758 CoSetProxyBlanket
0x1402a3760 CoCreateInstance
0x1402a3768 CoInitializeSecurity
0x1402a3770 CoInitializeEx
VCRUNTIME140.dll
0x1402a3000 strrchr
0x1402a3008 memmove
0x1402a3010 memset
0x1402a3018 memcpy
0x1402a3020 memcmp
0x1402a3028 __C_specific_handler
0x1402a3030 __current_exception
0x1402a3038 __current_exception_context
0x1402a3040 __CxxFrameHandler3
api-ms-win-crt-string-l1-1-0.dll
0x1402a31c0 strcspn
0x1402a31c8 strcmp
0x1402a31d0 strncmp
0x1402a31d8 strlen
api-ms-win-crt-utility-l1-1-0.dll
0x1402a31f8 qsort
0x1402a3200 _rotl64
api-ms-win-crt-heap-l1-1-0.dll
0x1402a30a0 malloc
0x1402a30a8 realloc
0x1402a30b0 _msize
0x1402a30b8 free
0x1402a30c0 _set_new_mode
api-ms-win-crt-time-l1-1-0.dll
0x1402a31e8 _localtime64_s
api-ms-win-crt-math-l1-1-0.dll
0x1402a30e0 _dclass
0x1402a30e8 __setusermatherr
0x1402a30f0 log
api-ms-win-crt-runtime-l1-1-0.dll
0x1402a3100 _initialize_onexit_table
0x1402a3108 _cexit
0x1402a3110 _c_exit
0x1402a3118 _configure_narrow_argv
0x1402a3120 _initialize_narrow_environment
0x1402a3128 _beginthreadex
0x1402a3130 _get_initial_narrow_environment
0x1402a3138 _set_app_type
0x1402a3140 _initterm
0x1402a3148 _initterm_e
0x1402a3150 exit
0x1402a3158 _exit
0x1402a3160 __p___argv
0x1402a3168 terminate
0x1402a3170 __p___argc
0x1402a3178 _crt_atexit
0x1402a3180 _seh_filter_exe
0x1402a3188 _register_onexit_function
0x1402a3190 _endthreadex
0x1402a3198 _register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0.dll
0x1402a31a8 __p__commode
0x1402a31b0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
0x1402a30d0 _configthreadlocale
EAT(Export Address Table) is none
kernel32.dll
0x1402a32e8 GetFileInformationByHandle
0x1402a32f0 GetModuleHandleA
0x1402a32f8 GetCurrentThread
0x1402a3300 GetStdHandle
0x1402a3308 GetConsoleMode
0x1402a3310 WaitForSingleObject
0x1402a3318 WriteConsoleW
0x1402a3320 WaitForSingleObjectEx
0x1402a3328 CreateMutexA
0x1402a3330 ReleaseMutex
0x1402a3338 GetEnvironmentVariableW
0x1402a3340 RtlLookupFunctionEntry
0x1402a3348 GetModuleHandleW
0x1402a3350 FormatMessageW
0x1402a3358 GetTempPathW
0x1402a3360 GetModuleFileNameW
0x1402a3368 CreateFileW
0x1402a3370 GlobalAlloc
0x1402a3378 GetFullPathNameW
0x1402a3380 MultiByteToWideChar
0x1402a3388 FindNextFileW
0x1402a3390 CreateDirectoryW
0x1402a3398 FindFirstFileW
0x1402a33a0 FindClose
0x1402a33a8 WideCharToMultiByte
0x1402a33b0 GlobalSize
0x1402a33b8 GlobalLock
0x1402a33c0 Sleep
0x1402a33c8 GetEnvironmentStringsW
0x1402a33d0 FreeEnvironmentStringsW
0x1402a33d8 CompareStringOrdinal
0x1402a33e0 GetSystemDirectoryW
0x1402a33e8 GetWindowsDirectoryW
0x1402a33f0 CreateProcessW
0x1402a33f8 GetFileAttributesW
0x1402a3400 DuplicateHandle
0x1402a3408 GetCurrentProcessId
0x1402a3410 CreateNamedPipeW
0x1402a3418 CreateThread
0x1402a3420 ReadFileEx
0x1402a3428 SleepEx
0x1402a3430 WriteFileEx
0x1402a3438 ReleaseSRWLockExclusive
0x1402a3440 ExitProcess
0x1402a3448 QueryPerformanceCounter
0x1402a3450 QueryPerformanceFrequency
0x1402a3458 GetSystemTimeAsFileTime
0x1402a3460 GetCurrentDirectoryW
0x1402a3468 RtlCaptureContext
0x1402a3470 AcquireSRWLockShared
0x1402a3478 ReleaseSRWLockShared
0x1402a3480 CopyFileExW
0x1402a3488 SleepConditionVariableSRW
0x1402a3490 SetHandleInformation
0x1402a3498 WakeConditionVariable
0x1402a34a0 PostQueuedCompletionStatus
0x1402a34a8 SetFileCompletionNotificationModes
0x1402a34b0 CreateIoCompletionPort
0x1402a34b8 TryAcquireSRWLockExclusive
0x1402a34c0 GetFinalPathNameByHandleW
0x1402a34c8 SetLastError
0x1402a34d0 GetQueuedCompletionStatusEx
0x1402a34d8 UnhandledExceptionFilter
0x1402a34e0 SwitchToThread
0x1402a34e8 SetUnhandledExceptionFilter
0x1402a34f0 GlobalUnlock
0x1402a34f8 GlobalFree
0x1402a3500 GetProcessHeap
0x1402a3508 HeapAlloc
0x1402a3510 FileTimeToSystemTime
0x1402a3518 SystemTimeToTzSpecificLocalTime
0x1402a3520 SystemTimeToFileTime
0x1402a3528 GetTimeZoneInformation
0x1402a3530 RtlVirtualUnwind
0x1402a3538 FlushFileBuffers
0x1402a3540 GetTickCount
0x1402a3548 MapViewOfFile
0x1402a3550 CreateFileMappingW
0x1402a3558 FormatMessageA
0x1402a3560 GetSystemTime
0x1402a3568 FreeLibrary
0x1402a3570 GetFileSize
0x1402a3578 LockFileEx
0x1402a3580 LocalFree
0x1402a3588 UnlockFile
0x1402a3590 HeapDestroy
0x1402a3598 HeapCompact
0x1402a35a0 LoadLibraryW
0x1402a35a8 DeleteFileW
0x1402a35b0 DeleteFileA
0x1402a35b8 CreateFileA
0x1402a35c0 FlushViewOfFile
0x1402a35c8 OutputDebugStringW
0x1402a35d0 GetFileAttributesExW
0x1402a35d8 GetFileAttributesA
0x1402a35e0 GetDiskFreeSpaceA
0x1402a35e8 GetTempPathA
0x1402a35f0 HeapSize
0x1402a35f8 HeapValidate
0x1402a3600 UnmapViewOfFile
0x1402a3608 CreateMutexW
0x1402a3610 UnlockFileEx
0x1402a3618 SetEndOfFile
0x1402a3620 GetFullPathNameA
0x1402a3628 SetFilePointer
0x1402a3630 LockFile
0x1402a3638 OutputDebugStringA
0x1402a3640 GetDiskFreeSpaceW
0x1402a3648 WriteFile
0x1402a3650 HeapCreate
0x1402a3658 ReadFile
0x1402a3660 AreFileApisANSI
0x1402a3668 InitializeCriticalSection
0x1402a3670 EnterCriticalSection
0x1402a3678 LeaveCriticalSection
0x1402a3680 TryEnterCriticalSection
0x1402a3688 DeleteCriticalSection
0x1402a3690 GetCurrentThreadId
0x1402a3698 SetThreadStackGuarantee
0x1402a36a0 AddVectoredExceptionHandler
0x1402a36a8 GetCurrentProcess
0x1402a36b0 GetProcAddress
0x1402a36b8 LoadLibraryA
0x1402a36c0 WakeAllConditionVariable
0x1402a36c8 HeapReAlloc
0x1402a36d0 GetLastError
0x1402a36d8 GetSystemInfo
0x1402a36e0 SetFilePointerEx
0x1402a36e8 TerminateProcess
0x1402a36f0 CloseHandle
0x1402a36f8 AcquireSRWLockExclusive
0x1402a3700 IsProcessorFeaturePresent
0x1402a3708 InitializeSListHead
0x1402a3710 IsDebuggerPresent
0x1402a3718 GetFileInformationByHandleEx
0x1402a3720 HeapFree
oleaut32.dll
0x1402a3780 SafeArrayDestroy
0x1402a3788 SafeArrayAccessData
0x1402a3790 SafeArrayGetUBound
0x1402a3798 SafeArrayGetLBound
0x1402a37a0 VariantClear
0x1402a37a8 SysFreeString
0x1402a37b0 SafeArrayUnaccessData
0x1402a37b8 SysAllocStringLen
ws2_32.dll
0x1402a3868 ioctlsocket
0x1402a3870 WSASocketW
0x1402a3878 ind
0x1402a3880 listen
0x1402a3888 WSASend
0x1402a3890 accept
0x1402a3898 setsockopt
0x1402a38a0 connect
0x1402a38a8 getaddrinfo
0x1402a38b0 getsockopt
0x1402a38b8 WSAIoctl
0x1402a38c0 freeaddrinfo
0x1402a38c8 WSAStartup
0x1402a38d0 WSACleanup
0x1402a38d8 getsockname
0x1402a38e0 WSAGetLastError
0x1402a38e8 getpeername
0x1402a38f0 recv
0x1402a38f8 closesocket
0x1402a3900 send
0x1402a3908 shutdown
0x1402a3910 socket
crypt32.dll
0x1402a3220 CertFreeCertificateContext
0x1402a3228 CertFreeCertificateChain
0x1402a3230 CertCloseStore
0x1402a3238 CertDuplicateStore
0x1402a3240 CertDuplicateCertificateContext
0x1402a3248 CertVerifyCertificateChainPolicy
0x1402a3250 CryptUnprotectData
0x1402a3258 CertGetCertificateChain
0x1402a3260 CertAddCertificateContextToStore
0x1402a3268 CertEnumCertificatesInStore
0x1402a3270 CertOpenStore
0x1402a3278 CertDuplicateCertificateChain
advapi32.dll
0x1402a3050 RegCreateKeyExA
0x1402a3058 RegSetValueExA
0x1402a3060 AllocateAndInitializeSid
0x1402a3068 FreeSid
0x1402a3070 CheckTokenMembership
0x1402a3078 RegQueryValueExW
0x1402a3080 RegCloseKey
0x1402a3088 SystemFunction036
0x1402a3090 RegOpenKeyExW
crypt.dll
0x1402a3210 BCryptGenRandom
user32.dll
0x1402a3820 EnumDisplaySettingsExW
0x1402a3828 SetClipboardData
0x1402a3830 EmptyClipboard
0x1402a3838 CloseClipboard
0x1402a3840 GetClipboardData
0x1402a3848 OpenClipboard
0x1402a3850 GetMonitorInfoW
0x1402a3858 EnumDisplayMonitors
ntdll.dll
0x1402a3730 NtCreateFile
0x1402a3738 NtCancelIoFileEx
0x1402a3740 NtDeviceIoControlFile
0x1402a3748 RtlNtStatusToDosError
secur32.dll
0x1402a37c8 InitializeSecurityContextW
0x1402a37d0 QueryContextAttributesW
0x1402a37d8 FreeContextBuffer
0x1402a37e0 DeleteSecurityContext
0x1402a37e8 EncryptMessage
0x1402a37f0 AcceptSecurityContext
0x1402a37f8 FreeCredentialsHandle
0x1402a3800 AcquireCredentialsHandleA
0x1402a3808 ApplyControlToken
0x1402a3810 DecryptMessage
gdi32.dll
0x1402a3288 GetDeviceCaps
0x1402a3290 DeleteDC
0x1402a3298 DeleteObject
0x1402a32a0 CreateCompatibleDC
0x1402a32a8 CreateCompatibleBitmap
0x1402a32b0 SelectObject
0x1402a32b8 SetStretchBltMode
0x1402a32c0 StretchBlt
0x1402a32c8 GetDIBits
0x1402a32d0 GetObjectW
0x1402a32d8 CreateDCW
ole32.dll
0x1402a3758 CoSetProxyBlanket
0x1402a3760 CoCreateInstance
0x1402a3768 CoInitializeSecurity
0x1402a3770 CoInitializeEx
VCRUNTIME140.dll
0x1402a3000 strrchr
0x1402a3008 memmove
0x1402a3010 memset
0x1402a3018 memcpy
0x1402a3020 memcmp
0x1402a3028 __C_specific_handler
0x1402a3030 __current_exception
0x1402a3038 __current_exception_context
0x1402a3040 __CxxFrameHandler3
api-ms-win-crt-string-l1-1-0.dll
0x1402a31c0 strcspn
0x1402a31c8 strcmp
0x1402a31d0 strncmp
0x1402a31d8 strlen
api-ms-win-crt-utility-l1-1-0.dll
0x1402a31f8 qsort
0x1402a3200 _rotl64
api-ms-win-crt-heap-l1-1-0.dll
0x1402a30a0 malloc
0x1402a30a8 realloc
0x1402a30b0 _msize
0x1402a30b8 free
0x1402a30c0 _set_new_mode
api-ms-win-crt-time-l1-1-0.dll
0x1402a31e8 _localtime64_s
api-ms-win-crt-math-l1-1-0.dll
0x1402a30e0 _dclass
0x1402a30e8 __setusermatherr
0x1402a30f0 log
api-ms-win-crt-runtime-l1-1-0.dll
0x1402a3100 _initialize_onexit_table
0x1402a3108 _cexit
0x1402a3110 _c_exit
0x1402a3118 _configure_narrow_argv
0x1402a3120 _initialize_narrow_environment
0x1402a3128 _beginthreadex
0x1402a3130 _get_initial_narrow_environment
0x1402a3138 _set_app_type
0x1402a3140 _initterm
0x1402a3148 _initterm_e
0x1402a3150 exit
0x1402a3158 _exit
0x1402a3160 __p___argv
0x1402a3168 terminate
0x1402a3170 __p___argc
0x1402a3178 _crt_atexit
0x1402a3180 _seh_filter_exe
0x1402a3188 _register_onexit_function
0x1402a3190 _endthreadex
0x1402a3198 _register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0.dll
0x1402a31a8 __p__commode
0x1402a31b0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
0x1402a30d0 _configthreadlocale
EAT(Export Address Table) is none