When you're reverse engineering a new piece of malware in IDA (the Disassembler and Debugger developed by Hex Rays), you hope that IDA can identify the library functions in the sample, and you can focus on functionality unique to the malware itself.
Often that's not the case and IDA presents a list of functions named by default with “sub_” followed by the function’s address (Figure 1 – left). It’s much more helpful when IDA has the correct library function signatures and provides a list containing more descriptive names. (Figure 1 – right).