AutoBot.exe
Description: SCAN
Authors: TODO: (c) <Company name>. All rights reserved.
Version: 1.0.0.1
Architecture: 64-bit
Operating System: Windows NT
SHA256: 61ae58ddb5a2be7599c3c955a62f6027
File Size: 14.5 MB
Uploaded At: March 6, 2026, 7:23 p.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
ADVAPI32.dll
- DeregisterEventSource (Address: 0x140d7b008)
- RegisterEventSourceA (Address: 0x140d7b000)
- RegOpenKeyExA (Address: 0x140e7d1bf)
api-ms-win-crt-convert-l1-1-0.dll
- wcstombs_s (Address: 0x140e7d431)
api-ms-win-crt-environment-l1-1-0.dll
- getenv (Address: 0x140e7d627)
api-ms-win-crt-filesystem-l1-1-0.dll
- _lock_file (Address: 0x140e7d5a8)
api-ms-win-crt-heap-l1-1-0.dll
- _set_new_mode (Address: 0x140e7d3ef)
api-ms-win-crt-locale-l1-1-0.dll
- _setmbcp (Address: 0x140e7d6a5)
api-ms-win-crt-math-l1-1-0.dll
- __setusermatherr (Address: 0x140e7d661)
api-ms-win-crt-multibyte-l1-1-0.dll
- _mbscmp (Address: 0x140e7d472)
api-ms-win-crt-runtime-l1-1-0.dll
- _invoke_watson (Address: 0x140e7d4af)
api-ms-win-crt-stdio-l1-1-0.dll
- _ftelli64 (Address: 0x140e7d52a)
api-ms-win-crt-string-l1-1-0.dll
- strcmp (Address: 0x140e7d5e6)
api-ms-win-crt-time-l1-1-0.dll
- _time64 (Address: 0x140e7d4ef)
api-ms-win-crt-utility-l1-1-0.dll
- rand (Address: 0x140e7d568)
COMCTL32.dll
- ImageList_Draw (Address: 0x140e7d226)
COMDLG32.dll
- GetOpenFileNameA (Address: 0x140e7d18f)
GDI32.dll
- SelectObject (Address: 0x140e7d163)
KERNEL32.dll
- CloseHandle (Address: 0x140d7b0f0)
- CompareStringW (Address: 0x140d7b560)
- ConvertThreadToFiber (Address: 0x140d7b3a8)
- CreateDirectoryW (Address: 0x140d7b398)
- CreateEventA (Address: 0x140d7b188)
- CreateEventW (Address: 0x140d7b2f0)
- CreateFileA (Address: 0x140d7b2f8)
- CreateFileMappingA (Address: 0x140d7b4f8)
- CreateFileW (Address: 0x140d7b318)
- CreateMutexA (Address: 0x140d7b220)
- CreateNamedPipeA (Address: 0x140d7b2e0)
- CreatePipe (Address: 0x140d7b2d8)
- CreateProcessA (Address: 0x140d7b488)
- CreateProcessW (Address: 0x140d7b2e8)
- CreateSemaphoreA (Address: 0x140d7b428)
- CreateThread (Address: 0x140d7b130)
- CreateToolhelp32Snapshot (Address: 0x140d7b108)
- DecodePointer (Address: 0x140d7b550)
- DefineDosDeviceA (Address: 0x140d7b470)
- DeleteCriticalSection (Address: 0x140d7b370)
- DeleteFiber (Address: 0x140d7b3b0)
- DeleteFileW (Address: 0x140d7b400)
- DeviceIoControl (Address: 0x140d7b350)
- DuplicateHandle (Address: 0x140d7b380)
- EncodePointer (Address: 0x140d7b548)
- EnterCriticalSection (Address: 0x140d7b028)
- EnumSystemLocalesW (Address: 0x140d7b5e0)
- ExitProcess (Address: 0x140d7b0d8)
- ExitThread (Address: 0x140d7b218)
- FindClose (Address: 0x140d7b4e8)
- FindFirstFileA (Address: 0x140d7b3e8)
- FindFirstFileExW (Address: 0x140d7b4e0)
- FindFirstFileW (Address: 0x140d7b388)
- FindNextFileA (Address: 0x140d7b3f0)
- FindNextFileW (Address: 0x140d7b450)
- FlushFileBuffers (Address: 0x140d7b3b8)
- FlushViewOfFile (Address: 0x140d7b250)
- FormatMessageA (Address: 0x140d7b1f0)
- FreeEnvironmentStringsW (Address: 0x140d7b4c0)
- FreeLibrary (Address: 0x140d7b260)
- GetACP (Address: 0x140d7b080)
- GetCommandLineA (Address: 0x140d7b168)
- GetCommandLineW (Address: 0x140d7b4d0)
- GetComputerNameExW (Address: 0x140d7b3f8)
- GetComputerNameW (Address: 0x140d7b460)
- GetConsoleCP (Address: 0x140d7b5e8)
- GetConsoleMode (Address: 0x140d7b5f0)
- GetCPInfo (Address: 0x140d7b580)
- GetCurrentDirectoryA (Address: 0x140d7b278)
- GetCurrentProcess (Address: 0x140d7b040)
- GetCurrentProcessId (Address: 0x140d7b050)
- GetCurrentThread (Address: 0x140d7b078)
- GetCurrentThreadId (Address: 0x140d7b0f8)
- GetDateFormatW (Address: 0x140d7b5c0)
- GetDriveTypeA (Address: 0x140d7b410)
- GetEnvironmentStringsW (Address: 0x140d7b4c8)
- GetEnvironmentVariableA (Address: 0x140d7b300)
- GetEnvironmentVariableW (Address: 0x140d7b360)
- GetExitCodeProcess (Address: 0x140d7b490)
- GetExitCodeThread (Address: 0x140d7b368)
- GetFileInformationByHandle (Address: 0x140d7b310)
- GetFileSize (Address: 0x140d7b3e0)
- GetFileSizeEx (Address: 0x140d7b600)
- GetFileType (Address: 0x140d7b230)
- GetLastError (Address: 0x140d7b068)
- GetLocaleInfoW (Address: 0x140d7b570)
- GetLocalTime (Address: 0x140d7b3d8)
- GetLogicalDrives (Address: 0x140d7b418)
- GetModuleFileNameA (Address: 0x140d7b0c0)
- GetModuleFileNameW (Address: 0x140d7b170)
- GetModuleHandleA (Address: 0x140d7b0b8)
- GetModuleHandleExA (Address: 0x140d7b280)
- GetModuleHandleExW (Address: 0x140d7b5b8)
- GetModuleHandleW (Address: 0x140d7b1b0)
- GetOEMCP (Address: 0x140d7b098)
- GetProcAddress (Address: 0x140e7d10e)
- GetProcAddress (Address: 0x140d7b0b0)
- GetProcessHeap (Address: 0x140d7b138)
- GetProcessTimes (Address: 0x140d7b308)
- GetStartupInfoW (Address: 0x140d7b538)
- GetStdHandle (Address: 0x140d7b5b0)
- GetStringTypeW (Address: 0x140d7b578)
- GetSystemDefaultLangID (Address: 0x140d7b088)
- GetSystemDefaultLCID (Address: 0x140d7b070)
- GetSystemDefaultUILanguage (Address: 0x140d7b048)
- GetSystemDirectoryA (Address: 0x140d7b2a8)
- GetSystemInfo (Address: 0x140d7b160)
- GetSystemTime (Address: 0x140d7b298)
- GetSystemTimeAsFileTime (Address: 0x140d7b3c0)
- GetThreadId (Address: 0x140d7b110)
- GetThreadLocale (Address: 0x140d7b058)
- GetThreadUILanguage (Address: 0x140d7b060)
- GetTickCount (Address: 0x140d7b0a0)
- GetTickCount64 (Address: 0x140d7b038)
- GetTimeFormatW (Address: 0x140d7b5c8)
- GetTimeZoneInformation (Address: 0x140d7b390)
- GetUserDefaultLangID (Address: 0x140d7b090)
- GetUserDefaultLCID (Address: 0x140d7b5d8)
- GetVersion (Address: 0x140d7b3d0)
- GetVersionExA (Address: 0x140d7b378)
- GetVolumeInformationA (Address: 0x140d7b358)
- GetWriteWatch (Address: 0x140d7b208)
- HeapAlloc (Address: 0x140d7b148)
- HeapFree (Address: 0x140d7b140)
- HeapReAlloc (Address: 0x140d7b1e8)
- HeapSize (Address: 0x140d7b4a8)
- InitializeConditionVariable (Address: 0x140d7b198)
- InitializeCriticalSection (Address: 0x140d7b1a0)
- InitializeCriticalSectionAndSpinCount (Address: 0x140d7b558)
- InitializeSListHead (Address: 0x140d7b508)
- InterlockedFlushSList (Address: 0x140d7b590)
- IsDebuggerPresent (Address: 0x140d7b200)
- IsProcessorFeaturePresent (Address: 0x140d7b540)
- IsValidCodePage (Address: 0x140d7b4d8)
- IsValidLocale (Address: 0x140d7b5d0)
- LCMapStringW (Address: 0x140d7b568)
- LeaveCriticalSection (Address: 0x140d7b030)
- LoadLibraryA (Address: 0x140d7b0a8)
- LoadLibraryExA (Address: 0x140d7b2b0)
- LoadLibraryExW (Address: 0x140d7b5a8)
- LocalAlloc (Address: 0x140d7b1d0)
- LocalFree (Address: 0x140d7b1d8)
- MapViewOfFile (Address: 0x140d7b288)
- Module32First (Address: 0x140d7b268)
- Module32Next (Address: 0x140d7b270)
- MoveFileExW (Address: 0x140d7b468)
- MultiByteToWideChar (Address: 0x140d7b2c8)
- OpenFileMappingA (Address: 0x140d7b498)
- OpenMutexA (Address: 0x140d7b2c0)
- OpenProcess (Address: 0x140d7b150)
- OpenSemaphoreA (Address: 0x140d7b440)
- OpenThread (Address: 0x140d7b0e0)
- OutputDebugStringA (Address: 0x140d7b2b8)
- PostQueuedCompletionStatus (Address: 0x140d7b240)
- QueryDosDeviceA (Address: 0x140d7b478)
- QueryDosDeviceW (Address: 0x140d7b248)
- QueryPerformanceCounter (Address: 0x140d7b328)
- QueryPerformanceFrequency (Address: 0x140d7b330)
- RaiseException (Address: 0x140d7b5a0)
- ReadConsoleW (Address: 0x140d7b5f8)
- ReadFile (Address: 0x140d7b340)
- ReadProcessMemory (Address: 0x140d7b158)
- ReleaseMutex (Address: 0x140d7b228)
- ReleaseSemaphore (Address: 0x140d7b438)
- RemoveDirectoryW (Address: 0x140d7b408)
- ResetWriteWatch (Address: 0x140d7b210)
- ResumeThread (Address: 0x140d7b0d0)
- RtlCaptureContext (Address: 0x140d7b510)
- RtlLookupFunctionEntry (Address: 0x140d7b518)
- RtlPcToFileHeader (Address: 0x140d7b598)
- RtlUnwind (Address: 0x140d7b608)
- RtlUnwindEx (Address: 0x140d7b588)
- RtlVirtualUnwind (Address: 0x140d7b520)
- SearchPathA (Address: 0x140d7b430)
- SetEndOfFile (Address: 0x140d7b480)
- SetEnvironmentVariableA (Address: 0x140d7b1a8)
- SetEnvironmentVariableW (Address: 0x140d7b4b8)
- SetErrorMode (Address: 0x140d7b3c8)
- SetEvent (Address: 0x140d7b500)
- SetFileAttributesW (Address: 0x140d7b458)
- SetFilePointerEx (Address: 0x140d7b448)
- SetHandleInformation (Address: 0x140d7b2d0)
- SetLastError (Address: 0x140d7b238)
- SetStdHandle (Address: 0x140d7b4b0)
- SetThreadPriority (Address: 0x140d7b338)
- SetUnhandledExceptionFilter (Address: 0x140d7b530)
- Sleep (Address: 0x140d7b4f0)
- SleepConditionVariableCS (Address: 0x140d7b1b8)
- SuspendThread (Address: 0x140d7b0c8)
- SwitchToFiber (Address: 0x140d7b3a0)
- SwitchToThread (Address: 0x140d7b420)
- SystemTimeToFileTime (Address: 0x140d7b2a0)
- TerminateProcess (Address: 0x140d7b190)
- TerminateThread (Address: 0x140d7b118)
- Thread32First (Address: 0x140d7b100)
- Thread32Next (Address: 0x140d7b0e8)
- TlsAlloc (Address: 0x140d7b1c0)
- TlsFree (Address: 0x140d7b1c8)
- TlsGetValue (Address: 0x140d7b180)
- TlsSetValue (Address: 0x140d7b178)
- UnhandledExceptionFilter (Address: 0x140d7b528)
- UnmapViewOfFile (Address: 0x140d7b258)
- VirtualAlloc (Address: 0x140d7b1e0)
- VirtualFree (Address: 0x140d7b1f8)
- VirtualProtect (Address: 0x140d7b020)
- VirtualQuery (Address: 0x140d7b018)
- WaitForSingleObject (Address: 0x140d7b120)
- WakeConditionVariable (Address: 0x140d7b128)
- WideCharToMultiByte (Address: 0x140d7b320)
- WriteConsoleW (Address: 0x140d7b4a0)
- WriteFile (Address: 0x140d7b348)
- WriteProcessMemory (Address: 0x140d7b290)
libcurl-x64.dll
- curl_easy_perform (Address: 0x140e7d0c0)
mfc140.dll
- (Address: 0x140e7d0ef)
MPR.dll
- WNetCancelConnection2A (Address: 0x140e7d330)
MSVCP140.dll
- ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z (Address: 0x140e7d2d0)
ole32.dll
- CoTaskMemFree (Address: 0x140e7d284)
OLEAUT32.dll
- VarUdateFromDate (Address: 0x140e7d2b1)
SHELL32.dll
- SHCreateItemFromParsingName (Address: 0x140e7d1eb)
SHLWAPI.dll
- PathRemoveExtensionA (Address: 0x140e7d253)
snvm_x64.dll
- ExecuteVM (Address: 0x140e7d6cd)
USER32.dll
- BlockInput (Address: 0x140d7b618)
- CallNextHookEx (Address: 0x140d7b658)
- EnableWindow (Address: 0x140e7d13a)
- EnumWindows (Address: 0x140d7b640)
- GetDlgItem (Address: 0x140d7b650)
- GetWindowThreadProcessId (Address: 0x140d7b660)
- MessageBoxA (Address: 0x140d7b638)
- SendMessageA (Address: 0x140d7b630)
- SetWindowsHookExA (Address: 0x140d7b628)
- ShowWindow (Address: 0x140d7b648)
- UnhookWindowsHookEx (Address: 0x140d7b620)
VCRUNTIME140_1.dll
- __CxxFrameHandler4 (Address: 0x140e7d36c)
VCRUNTIME140.dll
- __current_exception_context (Address: 0x140e7d3a2)