AotBst.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 2fa4297363719ca8602b8d193d0e3759

File Size: 20.5 KB

Uploaded At: Feb. 17, 2026, 8:41 p.m.

Views: 10

Exported Functions

  • CPU (Ordinal: 1, Address: 0x1040)
  • Cast (Ordinal: 2, Address: 0x1080)
  • InternalRead (Ordinal: 3, Address: 0x1060)
  • InternalWrite (Ordinal: 4, Address: 0x10a0)

Imported DLLs & Functions

api-ms-win-crt-runtime-l1-1-0.dll
  • _cexit (Address: 0x180004188)
  • _configure_narrow_argv (Address: 0x1800041b8)
  • _execute_onexit_table (Address: 0x1800041b0)
  • _initialize_narrow_environment (Address: 0x180004180)
  • _initialize_onexit_table (Address: 0x1800041a8)
  • _initterm (Address: 0x1800041a0)
  • _initterm_e (Address: 0x180004198)
  • _seh_filter_dll (Address: 0x180004190)
KERNEL32.dll
  • CloseHandle (Address: 0x1800040b0)
  • CreateThread (Address: 0x180004020)
  • CreateToolhelp32Snapshot (Address: 0x1800040a0)
  • DisableThreadLibraryCalls (Address: 0x180004010)
  • FlushInstructionCache (Address: 0x1800040d0)
  • FreeLibrary (Address: 0x180004030)
  • GetCurrentProcess (Address: 0x180004070)
  • GetCurrentProcessId (Address: 0x1800040c8)
  • GetCurrentThreadId (Address: 0x180004088)
  • GetModuleHandleA (Address: 0x180004000)
  • GetProcAddress (Address: 0x180004028)
  • GetSystemInfo (Address: 0x180004048)
  • GetSystemTimeAsFileTime (Address: 0x180004110)
  • GetThreadContext (Address: 0x1800040c0)
  • HeapAlloc (Address: 0x1800040b8)
  • HeapCreate (Address: 0x180004058)
  • HeapFree (Address: 0x180004068)
  • HeapReAlloc (Address: 0x1800040a8)
  • InitializeSListHead (Address: 0x180004108)
  • IsDebuggerPresent (Address: 0x180004100)
  • IsProcessorFeaturePresent (Address: 0x180004120)
  • LoadLibraryA (Address: 0x180004018)
  • OpenThread (Address: 0x1800040e0)
  • QueryPerformanceCounter (Address: 0x180004118)
  • ResumeThread (Address: 0x180004098)
  • RtlCaptureContext (Address: 0x180004138)
  • RtlLookupFunctionEntry (Address: 0x1800040e8)
  • RtlVirtualUnwind (Address: 0x1800040f0)
  • SetThreadContext (Address: 0x1800040d8)
  • SetUnhandledExceptionFilter (Address: 0x180004130)
  • Sleep (Address: 0x180004008)
  • SuspendThread (Address: 0x180004090)
  • TerminateProcess (Address: 0x180004128)
  • Thread32First (Address: 0x180004080)
  • Thread32Next (Address: 0x180004078)
  • UnhandledExceptionFilter (Address: 0x1800040f8)
  • VirtualAlloc (Address: 0x180004040)
  • VirtualFree (Address: 0x180004038)
  • VirtualProtect (Address: 0x180004060)
  • VirtualQuery (Address: 0x180004050)
USER32.dll
  • MessageBoxA (Address: 0x180004148)
VCRUNTIME140.dll
  • __C_specific_handler (Address: 0x180004170)
  • __std_type_info_destroy_list (Address: 0x180004168)
  • memcpy (Address: 0x180004158)
  • memset (Address: 0x180004160)