Static task
static1
Behavioral task
behavioral1
Sample
129537803ab15e6139b80c04fd81f9b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
129537803ab15e6139b80c04fd81f9b5.exe
Resource
win10v2004-20231215-en
General
-
Target
129537803ab15e6139b80c04fd81f9b5
-
Size
5.0MB
-
MD5
129537803ab15e6139b80c04fd81f9b5
-
SHA1
464f2639b09c6a45ae1b66379ed378a36c39c0ff
-
SHA256
e32bc88f2c953e230bf8a90b7ae3e4e96d24413ff2a91d54f76d3bb1604d2a00
-
SHA512
aca84b0e30462f2fed789a5c5d454d649598cdcbfd467ad394253ae37a087372f8b2cabe377ed7567fdb059f6d33fdfd00da357614b53a60926b87cde75a86cb
-
SSDEEP
49152:9DatOmGrJudlmWQKYpEdGGKGGTpl46YCN1pPQ5xx6u944GAJldW6YplrrrCbvvfP:9DajAlLKYpE/kI8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 129537803ab15e6139b80c04fd81f9b5
Files
-
129537803ab15e6139b80c04fd81f9b5.exe windows:4 windows x86 arch:x86
75de32b7e177bdaa13aec4d016ca3dc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avkernel
??0CAVKernel@@QAE@XZ
??1CAVKernel@@QAE@XZ
?GetInstallPath@@YAPBDPAD@Z
??1CAVLog@@QAE@XZ
??0CAVLog@@QAE@PBD00PAUHKEY__@@@Z
?GetLogPath@@YA_NPAD_N@Z
?Flush@CAVLog@@QAEXK@Z
?GetCurrentSessionFoundRegEntriesWithThreat@CBDCoreManip@@QAEKXZ
?GetCurrentSessionScannedRegEntries@CBDCoreManip@@QAEKXZ
?GetCurrentSessionFoundProcessWithThreat@CBDCoreManip@@QAEKXZ
?GetCurrentSessionScannedProcessCounter@CBDCoreManip@@QAEKXZ
?GetCurrentSessionScanedFileCounter@CBDCoreManip@@QAEKXZ
?GetProgressEngine@CBDCoreManip@@QAEPAVIProgressEngine@@XZ
?GetQuarantineInstance@CAVKernel@@QAEPAVCAVQuarantine@@XZ
?InitializeQuickScan@CBDCoreManip@@QAEJPAVIProgressEngine@@@Z
?AddLogEntry@CAVLog@@QAAXKIPBDZZ
?g_pLog@@3PAVCAVLog@@A
?DeleteAdware@@YAJK@Z
?DoSimpleDeletion@CAVQuarantine@@SA_NPBD@Z
?TrustAdware@@YAHK@Z
?SetEventsHandler@CAVQuarantine@@QAEXPAUIQuarantineEvents@1@@Z
?GetQuarantineFolder@CAVQuarantine@@SA_NDAAV?$CStringT@DV?$StrTraitATL@DV?$ChTraitsCRT@D@ATL@@@ATL@@@ATL@@_N@Z
?GetGlobalDataPath@@YAPBDPAD@Z
?IsQuarantineForDriveAllowed@CAVQuarantine@@SA_ND@Z
??0CDevLog@@QAE@H@Z
??RCDevLog@@QBAXKIPBDZZ
?ResetCurrentSessionStatistics@CBDCoreManip@@QAEXXZ
?DeleteBDCoreManip@CAVKernel@@QAEHPAVCBDCoreManip@@@Z
?CreateNew@CAVKernel@@QAEHAAPAVCBDCoreManip@@@Z
?SetScanResultArray@CBDCoreManip@@QAEXPAV?$CAtlArray@PAUSCANRESULTEX@@V?$CElementTraits@PAUSCANRESULTEX@@@ATL@@@ATL@@@Z
?Initialize@CBDCoreManip@@QAEHXZ
?AddCallbackEx@CBDCoreManip@@QAEXPAVIBDCoreManipEvents@1@@Z
?SetFilterThreats@CBDCoreManip@@QAEX_N@Z
?RemoveCallbackEx@CBDCoreManip@@QAEXPAVIBDCoreManipEvents@1@@Z
?GetVirusSignatureCount@CBDCoreManip@@QAEKXZ
?GetAdwareSpywareCount@@YAKXZ
?SetDefaultAction@CBDCoreManip@@QAEXH@Z
?Put_optHeuristics@CBDCoreManip@@QAEHH@Z
?Put_optScanArchives@CBDCoreManip@@QAEHH@Z
?Put_optScanPacked@CBDCoreManip@@QAEHH@Z
?Put_optScanEmail@CBDCoreManip@@QAEHH@Z
?Go@CBDCoreManip@@QAEXXZ
?Pause@CBDCoreManip@@QAEXXZ
?Stop@CBDCoreManip@@QAEXXZ
?ScanFile@CBDCoreManip@@QAEHPBD@Z
?ScanBoot@CBDCoreManip@@QAEHPBD@Z
?WASRegistryScan@CBDCoreManip@@QAEXXZ
?MemoryScan@CBDCoreManip@@QAEXXZ
?AsQuickScan@CBDCoreManip@@QAEXXZ
?Put_optExtensions@CBDCoreManip@@QAEHPBD@Z
?ScanFolderOnly@CBDCoreManip@@QAEHPBD@Z
?ScanFolder@CBDCoreManip@@QAEHPBD@Z
?GetQuarantineFolder@CAVQuarantine@@SAPBDD@Z
?SetProgressCallback@CBDCoreManip@@QAEHP6AXPBDK_KPAX@Z2@Z
?GetLastScanned@CBDCoreManip@@QAEXPAD@Z
?GetCurrenSessionFoundFileWithThreat@CBDCoreManip@@QAEKXZ
?EnableImmediateScanResults@CBDCoreManip@@QAEX_N@Z
?SetCallback@CBDCoreManip@@QAEXP6AXPAUSCANRESULTEX@@PAX@Z1@Z
?FixFile@CBDCoreManip@@QAEHPBD@Z
sqlite3
sqlite3_open
sqlite3_free
sqlite3_close
sqlite3_finalize
sqlite3_exec
sqlite3_column_text
sqlite3_column_int64
sqlite3_bind_text
sqlite3_errcode
sqlite3_bind_int64
sqlite3_last_insert_rowid
sqlite3_bind_int
sqlite3_step
sqlite3_column_int
sqlite3_reset
sqlite3_prepare
shfolder
SHGetFolderPathA
asmngr
?Activate@assistant@@YAHXZ
?HideAssistant@assistant@@YAHH@Z
?ShowAssistant@assistant@@YAH_N@Z
?StopSpeaking@assistant@@YAHXZ
?ShowToolTip@assistant@@YAHH@Z
?LoadAssistant@assistant@@YAHH@Z
?UnLoadAssistant@assistant@@YAXH@Z
?Deactivate@assistant@@YAHXZ
?SetEventHandler@assistant@@YAXP6AXW4VisibilityCause@1@@ZP6AXH@Z@Z
?IsAssistantVisible@assistant@@YAHXZ
rpt
?put_Country@@YAJPAG@Z
?put_State@@YAJPAG@Z
?InitReport@@YAJPAG000@Z
?GetStatsUrlForPeriod@@YAJW4REPRESENTATION_TYPE@@W4REGIONS@@PAG2W4PERIOD@@PAPAG@Z
?Authorize@@YAJPAW4AUTH_RESULT@@@Z
mfc71
ord1185
ord5331
ord6297
ord5320
ord6286
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord4261
ord3333
ord757
ord566
ord2248
ord1486
ord1290
ord572
ord1024
ord1101
ord1054
ord3830
ord1482
ord4081
ord1084
ord3210
ord1934
ord3161
ord1280
ord1063
ord1283
ord709
ord501
ord1395
ord3881
ord651
ord416
ord2657
ord4118
ord6138
ord2164
ord1564
ord4115
ord3680
ord3587
ord5073
ord5203
ord356
ord605
ord5915
ord1402
ord4232
ord5214
ord3287
ord3163
ord4100
ord2094
ord3244
ord1955
ord2095
ord1591
ord4240
ord2991
ord3317
ord741
ord1654
ord1598
ord2987
ord3328
ord754
ord3883
ord5868
ord760
ord6120
ord1930
ord4749
ord589
ord4001
ord4123
ord5641
ord330
ord2884
ord2867
ord1425
ord2876
ord3799
ord2370
ord5613
ord3348
ord758
ord2264
ord2074
ord2075
ord567
ord2368
ord2367
ord3676
ord3583
ord1594
ord3204
ord2098
ord1650
ord4243
ord748
ord3401
ord6168
ord2451
ord4085
ord6020
ord3641
ord3441
ord3302
ord354
ord5623
ord4580
ord3989
ord3651
ord1979
ord5059
ord2092
ord1641
ord1571
ord4238
ord2958
ord3255
ord658
ord3879
ord502
ord5634
ord2882
ord2873
ord2794
ord5746
ord2495
ord2654
ord4888
ord4394
ord3684
ord3423
ord2160
ord1545
ord1377
ord587
ord5710
ord865
ord6172
ord6178
ord2321
ord3997
ord2271
ord5529
ord602
ord1966
ord1279
ord347
ord3596
ord2719
ord3761
ord4078
ord6037
ord5642
ord5731
ord3563
ord1645
ord1586
ord3304
ord730
ord4761
ord908
ord4109
ord5491
ord5994
ord5991
ord2877
ord5637
ord2371
ord6017
ord1248
ord1258
ord6182
ord4564
ord2322
ord1263
ord5154
ord2914
ord1262
ord2263
ord1794
ord5873
ord5658
ord3875
ord3795
ord6006
ord5716
ord5866
ord745
ord557
ord1917
ord807
ord630
ord629
ord5089
ord384
ord3088
ord2021
ord385
ord4353
ord2131
ord1931
ord1483
ord4098
ord2089
ord4234
ord5714
ord1565
ord722
ord530
ord5444
ord1091
ord2866
ord326
ord3635
ord3595
ord3908
ord5227
ord4569
ord5567
ord759
ord570
ord3602
ord3609
ord2475
ord2141
ord1035
ord2566
ord2815
ord1034
ord1929
ord1025
ord4320
ord5640
ord5871
ord2292
ord4108
ord1647
ord1589
ord739
ord2249
ord1126
ord4104
ord5715
ord2942
ord3336
ord3174
ord747
ord559
ord6283
ord1740
ord1968
ord631
ord2751
ord2748
ord3931
ord2288
ord2280
ord386
ord272
ord383
ord1439
ord5323
ord2903
ord5420
ord4083
ord4648
ord4692
ord2346
ord2234
ord1580
ord2233
ord5727
ord3952
ord3835
ord3473
ord2090
ord1637
ord1558
ord4236
ord642
ord1031
ord6236
ord6041
ord744
ord1452
ord6310
ord5097
ord556
ord6040
ord2306
ord3437
ord1550
ord599
ord4350
ord3454
ord1554
ord3195
ord620
ord3551
ord1643
ord715
ord1581
ord3139
ord3430
ord3488
ord1397
ord6266
ord1933
ord1484
ord4099
ord2091
ord1570
ord4237
ord657
ord1547
ord591
ord5647
ord3574
ord259
ord1971
ord2938
ord1092
ord3233
ord423
ord660
ord4063
ord866
ord5466
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord577
ord2467
ord777
ord293
ord1614
ord300
ord1230
ord2272
ord5563
ord1916
ord3683
ord2468
ord5403
ord266
ord1187
ord1191
ord781
ord762
ord265
ord2933
ord299
ord6118
ord2902
ord1489
ord297
ord6119
ord911
ord3934
ord907
ord784
ord5833
ord1903
ord3397
ord304
ord2168
ord6090
ord764
ord2372
ord310
ord4035
ord2469
ord6065
ord876
ord6067
ord4125
ord578
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord4185
ord6275
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3230
ord1207
msvcr71
_except_handler3
__CxxFrameHandler
free
_time64
fclose
fgets
fopen
malloc
_resetstkoflw
??0exception@@QAE@ABV0@@Z
_CxxThrowException
memmove
_mbsstr
_mbsicmp
strchr
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_stricmp
atoi
_localtime64
div
strtol
_fsopen
fflush
_chsize
rewind
fread
ftell
fwrite
fseek
_strtime
_strdate
_mktime64
time
vsprintf
_vscprintf
_mbctype
strftime
_purecall
sprintf
_mbsrchr
_mbscmp
strrchr
strncmp
_mbsnbcpy
_mbschr
_mbslwr
_strdup
ceil
strtoul
floor
_beginthread
realloc
_beginthreadex
strstr
_mbsspn
_mbscspn
_wcsdup
toupper
memset
__security_error_handler
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strcmpi
_fileno
_itoa
_setmbcp
_controlfp
kernel32
HeapSize
HeapReAlloc
HeapDestroy
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
ExitProcess
GetFileAttributesW
GetLogicalDriveStringsW
QueryDosDeviceW
GetThreadPriority
GetDateFormatA
GetTimeFormatA
FileTimeToSystemTime
GetFullPathNameA
WritePrivateProfileStringA
WriteProfileStringA
GetProfileStringA
lstrcmpA
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
OutputDebugStringA
LocalFree
GetTickCount
GetLocalTime
GetWindowsDirectoryA
FindFirstFileA
FindClose
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CloseHandle
OpenMutexA
GetCurrentProcess
OpenFileMappingA
OpenEventA
ResetEvent
SetEvent
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
WaitForSingleObject
WaitForMultipleObjects
CreateThread
CreateFileMappingA
GetLastError
CreateMutexA
CreateEventA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
lstrlenW
lstrlenA
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
lstrcpynA
TerminateThread
OpenProcess
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameA
GetCurrentProcessId
GetProcAddress
GetFileAttributesA
GetCurrentThreadId
GetCommandLineA
MulDiv
SetWaitableTimer
CreateWaitableTimerA
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
LockResource
FreeResource
SizeofResource
LoadResource
FindResourceA
GetDriveTypeA
GetTempPathA
FindNextFileA
GetDiskFreeSpaceExA
GetExitCodeThread
LoadLibraryA
GetLogicalDriveStringsA
FreeLibrary
WriteFile
CreateFileA
ReadFile
GetFileSize
SetFilePointer
lstrcatA
TerminateProcess
CreateProcessA
SetPriorityClass
ResumeThread
SetThreadPriority
GetPrivateProfileStringA
SystemTimeToFileTime
GetShortPathNameA
GetLongPathNameA
FindResourceExA
VirtualFree
VirtualAlloc
Sleep
GetCurrentThread
LocalAlloc
GetVersion
user32
IsRectEmpty
DestroyCursor
DrawStateA
ShowWindow
GetDlgCtrlID
GetWindow
ReleaseCapture
SetCapture
LoadCursorA
SetCursor
GetKeyState
FindWindowExA
GetFocus
CopyRect
RegisterClassExA
BeginPaint
EndPaint
SetWindowPos
FillRect
DrawTextA
PtInRect
GetWindowDC
InflateRect
EnableScrollBar
SetScrollPos
GetDesktopWindow
GetMenuItemRect
IsWindow
RedrawWindow
GetDC
GetSubMenu
IsWindowEnabled
ReleaseDC
DispatchMessageW
GetMessageW
IsWindowUnicode
GetClassLongA
SendMessageTimeoutA
UnionRect
GetWindowTextA
EnumWindows
InsertMenuItemA
IsMenu
GetMenuState
GetMenuDefaultItem
GetMenuItemInfoA
SetMenuItemBitmaps
SetMenuItemInfoA
FrameRect
ValidateRect
CloseWindow
EnumThreadWindows
GetSystemMenu
TrackPopupMenu
GetCursorPos
GetSystemMetrics
SetForegroundWindow
IsWindowVisible
InvalidateRect
UpdateWindow
ScreenToClient
ClientToScreen
MapWindowPoints
SetFocus
LoadMenuA
ShowWindowAsync
MsgWaitForMultipleObjects
wsprintfA
OffsetRect
SetParent
GetWindowThreadProcessId
AttachThreadInput
VkKeyScanA
GetForegroundWindow
GetWindowRgn
TrackMouseEvent
GetSysColor
SetWindowRgn
SetRectEmpty
SystemParametersInfoA
GetActiveWindow
TrackPopupMenuEx
SetRect
GetDlgItem
GetParent
EnableWindow
TranslateMessage
DispatchMessageA
PeekMessageA
CharUpperBuffA
CallWindowProcA
DestroyMenu
IsZoomed
GetMenuItemID
AppendMenuA
WindowFromPoint
UnhookWindowsHookEx
GetAsyncKeyState
GetCapture
GetComboBoxInfo
DrawFocusRect
keybd_event
SetWindowsHookExA
GetKeyboardState
CallNextHookEx
SetKeyboardState
GetWindowRect
GetClientRect
IsIconic
GetClassNameA
GetMenuItemCount
SetMenuDefaultItem
EnableMenuItem
DeleteMenu
CreatePopupMenu
DrawIcon
LoadBitmapA
FindWindowA
GetWindowModuleFileNameA
LoadIconA
LoadStringA
GetMessageA
CreateWindowExA
SetWindowLongA
RegisterWindowMessageA
GetWindowLongA
DefWindowProcA
PostThreadMessageA
SendMessageA
LockWindowUpdate
KillTimer
SetTimer
PostMessageA
ExitWindowsEx
gdi32
GetDIBits
SetWorldTransform
CombineTransform
SetGraphicsMode
CreateEllipticRgn
GetBkMode
GetBkColor
GetTextColor
CreateBitmap
SetBitmapBits
GetBitmapBits
SetMapMode
GetMapMode
DPtoLP
SetStretchBltMode
CombineRgn
PtInRegion
CreateRectRgn
CreateFontA
Rectangle
GetTextMetricsA
GetPixel
SetBkColor
TextOutA
GetTextExtentPoint32A
CreateRectRgnIndirect
GetStockObject
SetBkMode
GetDeviceCaps
CreateFontIndirectA
GetObjectA
StretchBlt
SetPixel
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetTextColor
CreatePen
MoveToEx
LineTo
BitBlt
DeleteDC
CreateBrushIndirect
DeleteObject
msimg32
AlphaBlend
advapi32
RegEnumValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
OpenThreadToken
SetNamedSecurityInfoA
RegEnumKeyExA
shell32
ord25
ShellExecuteA
SHAppBarMessage
ord165
SHGetDesktopFolder
SHGetSpecialFolderLocation
ord155
ord18
SHGetMalloc
ord21
SHGetSpecialFolderPathA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
ImageList_AddMasked
ImageList_Draw
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_DrawEx
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_Remove
ImageList_GetIcon
ImageList_ReplaceIcon
shlwapi
PathFindExtensionA
PathStripPathA
PathCombineA
PathRemoveFileSpecA
StrStrIA
PathFindFileNameA
PathIsRootA
PathAppendA
PathFileExistsA
PathIsDirectoryA
PathIsDirectoryEmptyA
StrStrIW
ole32
StgOpenStorage
StgCreateDocfile
CoInitializeEx
CoCreateInstance
CreateStreamOnHGlobal
CoInitialize
CLSIDFromProgID
OleRun
CoUninitialize
CoInitializeSecurity
CLSIDFromString
oleaut32
SysStringLen
VarUdateFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
OleLoadPicture
SysStringByteLen
SysAllocStringByteLen
SysFreeString
GetErrorInfo
msvcp71
??1strstream@std@@UAE@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1strstreambuf@std@@UAE@XZ
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?freeze@strstreambuf@std@@QAEX_N@Z
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Init@strstreambuf@std@@IAEXHPAD0H@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?overflow@strstreambuf@std@@MAEHH@Z
?pbackfail@strstreambuf@std@@MAEHH@Z
?underflow@strstreambuf@std@@MAEHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHPADH@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHPBDH@Z
?seekoff@strstreambuf@std@@MAE?AV?$fpos@H@2@JHH@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PADH@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?find_first_not_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@Viterator@12@0ABV12@@Z
??0?$_String_val@DV?$allocator@D@std@@@std@@IAE@V?$allocator@D@1@@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?reserve@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEX_NI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?seekpos@strstreambuf@std@@MAE?AV?$fpos@H@2@V32@H@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ID@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ws2_32
WSAStartup
gethostbyaddr
sendto
ntohs
gethostname
inet_ntoa
connect
socket
closesocket
WSACleanup
getservbyport
iphlpapi
GetTcpTable
GetUdpTable
Sections
.text Size: 716KB - Virtual size: 712KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ