AutoBot.exe

Description: SCAN

Authors: TODO: (c) <Company name>. All rights reserved.

Version: 1.0.0.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 61ae58ddb5a2be7599c3c955a62f6027

File Size: 14.5 MB

Uploaded At: March 6, 2026, 7:23 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • DeregisterEventSource (Address: 0x140d7b008)
  • RegisterEventSourceA (Address: 0x140d7b000)
  • RegOpenKeyExA (Address: 0x140e7d1bf)
api-ms-win-crt-convert-l1-1-0.dll
  • wcstombs_s (Address: 0x140e7d431)
api-ms-win-crt-environment-l1-1-0.dll
  • getenv (Address: 0x140e7d627)
api-ms-win-crt-filesystem-l1-1-0.dll
  • _lock_file (Address: 0x140e7d5a8)
api-ms-win-crt-heap-l1-1-0.dll
  • _set_new_mode (Address: 0x140e7d3ef)
api-ms-win-crt-locale-l1-1-0.dll
  • _setmbcp (Address: 0x140e7d6a5)
api-ms-win-crt-math-l1-1-0.dll
  • __setusermatherr (Address: 0x140e7d661)
api-ms-win-crt-multibyte-l1-1-0.dll
  • _mbscmp (Address: 0x140e7d472)
api-ms-win-crt-runtime-l1-1-0.dll
  • _invoke_watson (Address: 0x140e7d4af)
api-ms-win-crt-stdio-l1-1-0.dll
  • _ftelli64 (Address: 0x140e7d52a)
api-ms-win-crt-string-l1-1-0.dll
  • strcmp (Address: 0x140e7d5e6)
api-ms-win-crt-time-l1-1-0.dll
  • _time64 (Address: 0x140e7d4ef)
api-ms-win-crt-utility-l1-1-0.dll
  • rand (Address: 0x140e7d568)
COMCTL32.dll
  • ImageList_Draw (Address: 0x140e7d226)
COMDLG32.dll
  • GetOpenFileNameA (Address: 0x140e7d18f)
GDI32.dll
  • SelectObject (Address: 0x140e7d163)
KERNEL32.dll
  • CloseHandle (Address: 0x140d7b0f0)
  • CompareStringW (Address: 0x140d7b560)
  • ConvertThreadToFiber (Address: 0x140d7b3a8)
  • CreateDirectoryW (Address: 0x140d7b398)
  • CreateEventA (Address: 0x140d7b188)
  • CreateEventW (Address: 0x140d7b2f0)
  • CreateFileA (Address: 0x140d7b2f8)
  • CreateFileMappingA (Address: 0x140d7b4f8)
  • CreateFileW (Address: 0x140d7b318)
  • CreateMutexA (Address: 0x140d7b220)
  • CreateNamedPipeA (Address: 0x140d7b2e0)
  • CreatePipe (Address: 0x140d7b2d8)
  • CreateProcessA (Address: 0x140d7b488)
  • CreateProcessW (Address: 0x140d7b2e8)
  • CreateSemaphoreA (Address: 0x140d7b428)
  • CreateThread (Address: 0x140d7b130)
  • CreateToolhelp32Snapshot (Address: 0x140d7b108)
  • DecodePointer (Address: 0x140d7b550)
  • DefineDosDeviceA (Address: 0x140d7b470)
  • DeleteCriticalSection (Address: 0x140d7b370)
  • DeleteFiber (Address: 0x140d7b3b0)
  • DeleteFileW (Address: 0x140d7b400)
  • DeviceIoControl (Address: 0x140d7b350)
  • DuplicateHandle (Address: 0x140d7b380)
  • EncodePointer (Address: 0x140d7b548)
  • EnterCriticalSection (Address: 0x140d7b028)
  • EnumSystemLocalesW (Address: 0x140d7b5e0)
  • ExitProcess (Address: 0x140d7b0d8)
  • ExitThread (Address: 0x140d7b218)
  • FindClose (Address: 0x140d7b4e8)
  • FindFirstFileA (Address: 0x140d7b3e8)
  • FindFirstFileExW (Address: 0x140d7b4e0)
  • FindFirstFileW (Address: 0x140d7b388)
  • FindNextFileA (Address: 0x140d7b3f0)
  • FindNextFileW (Address: 0x140d7b450)
  • FlushFileBuffers (Address: 0x140d7b3b8)
  • FlushViewOfFile (Address: 0x140d7b250)
  • FormatMessageA (Address: 0x140d7b1f0)
  • FreeEnvironmentStringsW (Address: 0x140d7b4c0)
  • FreeLibrary (Address: 0x140d7b260)
  • GetACP (Address: 0x140d7b080)
  • GetCommandLineA (Address: 0x140d7b168)
  • GetCommandLineW (Address: 0x140d7b4d0)
  • GetComputerNameExW (Address: 0x140d7b3f8)
  • GetComputerNameW (Address: 0x140d7b460)
  • GetConsoleCP (Address: 0x140d7b5e8)
  • GetConsoleMode (Address: 0x140d7b5f0)
  • GetCPInfo (Address: 0x140d7b580)
  • GetCurrentDirectoryA (Address: 0x140d7b278)
  • GetCurrentProcess (Address: 0x140d7b040)
  • GetCurrentProcessId (Address: 0x140d7b050)
  • GetCurrentThread (Address: 0x140d7b078)
  • GetCurrentThreadId (Address: 0x140d7b0f8)
  • GetDateFormatW (Address: 0x140d7b5c0)
  • GetDriveTypeA (Address: 0x140d7b410)
  • GetEnvironmentStringsW (Address: 0x140d7b4c8)
  • GetEnvironmentVariableA (Address: 0x140d7b300)
  • GetEnvironmentVariableW (Address: 0x140d7b360)
  • GetExitCodeProcess (Address: 0x140d7b490)
  • GetExitCodeThread (Address: 0x140d7b368)
  • GetFileInformationByHandle (Address: 0x140d7b310)
  • GetFileSize (Address: 0x140d7b3e0)
  • GetFileSizeEx (Address: 0x140d7b600)
  • GetFileType (Address: 0x140d7b230)
  • GetLastError (Address: 0x140d7b068)
  • GetLocaleInfoW (Address: 0x140d7b570)
  • GetLocalTime (Address: 0x140d7b3d8)
  • GetLogicalDrives (Address: 0x140d7b418)
  • GetModuleFileNameA (Address: 0x140d7b0c0)
  • GetModuleFileNameW (Address: 0x140d7b170)
  • GetModuleHandleA (Address: 0x140d7b0b8)
  • GetModuleHandleExA (Address: 0x140d7b280)
  • GetModuleHandleExW (Address: 0x140d7b5b8)
  • GetModuleHandleW (Address: 0x140d7b1b0)
  • GetOEMCP (Address: 0x140d7b098)
  • GetProcAddress (Address: 0x140e7d10e)
  • GetProcAddress (Address: 0x140d7b0b0)
  • GetProcessHeap (Address: 0x140d7b138)
  • GetProcessTimes (Address: 0x140d7b308)
  • GetStartupInfoW (Address: 0x140d7b538)
  • GetStdHandle (Address: 0x140d7b5b0)
  • GetStringTypeW (Address: 0x140d7b578)
  • GetSystemDefaultLangID (Address: 0x140d7b088)
  • GetSystemDefaultLCID (Address: 0x140d7b070)
  • GetSystemDefaultUILanguage (Address: 0x140d7b048)
  • GetSystemDirectoryA (Address: 0x140d7b2a8)
  • GetSystemInfo (Address: 0x140d7b160)
  • GetSystemTime (Address: 0x140d7b298)
  • GetSystemTimeAsFileTime (Address: 0x140d7b3c0)
  • GetThreadId (Address: 0x140d7b110)
  • GetThreadLocale (Address: 0x140d7b058)
  • GetThreadUILanguage (Address: 0x140d7b060)
  • GetTickCount (Address: 0x140d7b0a0)
  • GetTickCount64 (Address: 0x140d7b038)
  • GetTimeFormatW (Address: 0x140d7b5c8)
  • GetTimeZoneInformation (Address: 0x140d7b390)
  • GetUserDefaultLangID (Address: 0x140d7b090)
  • GetUserDefaultLCID (Address: 0x140d7b5d8)
  • GetVersion (Address: 0x140d7b3d0)
  • GetVersionExA (Address: 0x140d7b378)
  • GetVolumeInformationA (Address: 0x140d7b358)
  • GetWriteWatch (Address: 0x140d7b208)
  • HeapAlloc (Address: 0x140d7b148)
  • HeapFree (Address: 0x140d7b140)
  • HeapReAlloc (Address: 0x140d7b1e8)
  • HeapSize (Address: 0x140d7b4a8)
  • InitializeConditionVariable (Address: 0x140d7b198)
  • InitializeCriticalSection (Address: 0x140d7b1a0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x140d7b558)
  • InitializeSListHead (Address: 0x140d7b508)
  • InterlockedFlushSList (Address: 0x140d7b590)
  • IsDebuggerPresent (Address: 0x140d7b200)
  • IsProcessorFeaturePresent (Address: 0x140d7b540)
  • IsValidCodePage (Address: 0x140d7b4d8)
  • IsValidLocale (Address: 0x140d7b5d0)
  • LCMapStringW (Address: 0x140d7b568)
  • LeaveCriticalSection (Address: 0x140d7b030)
  • LoadLibraryA (Address: 0x140d7b0a8)
  • LoadLibraryExA (Address: 0x140d7b2b0)
  • LoadLibraryExW (Address: 0x140d7b5a8)
  • LocalAlloc (Address: 0x140d7b1d0)
  • LocalFree (Address: 0x140d7b1d8)
  • MapViewOfFile (Address: 0x140d7b288)
  • Module32First (Address: 0x140d7b268)
  • Module32Next (Address: 0x140d7b270)
  • MoveFileExW (Address: 0x140d7b468)
  • MultiByteToWideChar (Address: 0x140d7b2c8)
  • OpenFileMappingA (Address: 0x140d7b498)
  • OpenMutexA (Address: 0x140d7b2c0)
  • OpenProcess (Address: 0x140d7b150)
  • OpenSemaphoreA (Address: 0x140d7b440)
  • OpenThread (Address: 0x140d7b0e0)
  • OutputDebugStringA (Address: 0x140d7b2b8)
  • PostQueuedCompletionStatus (Address: 0x140d7b240)
  • QueryDosDeviceA (Address: 0x140d7b478)
  • QueryDosDeviceW (Address: 0x140d7b248)
  • QueryPerformanceCounter (Address: 0x140d7b328)
  • QueryPerformanceFrequency (Address: 0x140d7b330)
  • RaiseException (Address: 0x140d7b5a0)
  • ReadConsoleW (Address: 0x140d7b5f8)
  • ReadFile (Address: 0x140d7b340)
  • ReadProcessMemory (Address: 0x140d7b158)
  • ReleaseMutex (Address: 0x140d7b228)
  • ReleaseSemaphore (Address: 0x140d7b438)
  • RemoveDirectoryW (Address: 0x140d7b408)
  • ResetWriteWatch (Address: 0x140d7b210)
  • ResumeThread (Address: 0x140d7b0d0)
  • RtlCaptureContext (Address: 0x140d7b510)
  • RtlLookupFunctionEntry (Address: 0x140d7b518)
  • RtlPcToFileHeader (Address: 0x140d7b598)
  • RtlUnwind (Address: 0x140d7b608)
  • RtlUnwindEx (Address: 0x140d7b588)
  • RtlVirtualUnwind (Address: 0x140d7b520)
  • SearchPathA (Address: 0x140d7b430)
  • SetEndOfFile (Address: 0x140d7b480)
  • SetEnvironmentVariableA (Address: 0x140d7b1a8)
  • SetEnvironmentVariableW (Address: 0x140d7b4b8)
  • SetErrorMode (Address: 0x140d7b3c8)
  • SetEvent (Address: 0x140d7b500)
  • SetFileAttributesW (Address: 0x140d7b458)
  • SetFilePointerEx (Address: 0x140d7b448)
  • SetHandleInformation (Address: 0x140d7b2d0)
  • SetLastError (Address: 0x140d7b238)
  • SetStdHandle (Address: 0x140d7b4b0)
  • SetThreadPriority (Address: 0x140d7b338)
  • SetUnhandledExceptionFilter (Address: 0x140d7b530)
  • Sleep (Address: 0x140d7b4f0)
  • SleepConditionVariableCS (Address: 0x140d7b1b8)
  • SuspendThread (Address: 0x140d7b0c8)
  • SwitchToFiber (Address: 0x140d7b3a0)
  • SwitchToThread (Address: 0x140d7b420)
  • SystemTimeToFileTime (Address: 0x140d7b2a0)
  • TerminateProcess (Address: 0x140d7b190)
  • TerminateThread (Address: 0x140d7b118)
  • Thread32First (Address: 0x140d7b100)
  • Thread32Next (Address: 0x140d7b0e8)
  • TlsAlloc (Address: 0x140d7b1c0)
  • TlsFree (Address: 0x140d7b1c8)
  • TlsGetValue (Address: 0x140d7b180)
  • TlsSetValue (Address: 0x140d7b178)
  • UnhandledExceptionFilter (Address: 0x140d7b528)
  • UnmapViewOfFile (Address: 0x140d7b258)
  • VirtualAlloc (Address: 0x140d7b1e0)
  • VirtualFree (Address: 0x140d7b1f8)
  • VirtualProtect (Address: 0x140d7b020)
  • VirtualQuery (Address: 0x140d7b018)
  • WaitForSingleObject (Address: 0x140d7b120)
  • WakeConditionVariable (Address: 0x140d7b128)
  • WideCharToMultiByte (Address: 0x140d7b320)
  • WriteConsoleW (Address: 0x140d7b4a0)
  • WriteFile (Address: 0x140d7b348)
  • WriteProcessMemory (Address: 0x140d7b290)
libcurl-x64.dll
  • curl_easy_perform (Address: 0x140e7d0c0)
mfc140.dll
  • (Address: 0x140e7d0ef)
MPR.dll
  • WNetCancelConnection2A (Address: 0x140e7d330)
MSVCP140.dll
  • ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z (Address: 0x140e7d2d0)
ole32.dll
  • CoTaskMemFree (Address: 0x140e7d284)
OLEAUT32.dll
  • VarUdateFromDate (Address: 0x140e7d2b1)
SHELL32.dll
  • SHCreateItemFromParsingName (Address: 0x140e7d1eb)
SHLWAPI.dll
  • PathRemoveExtensionA (Address: 0x140e7d253)
snvm_x64.dll
  • ExecuteVM (Address: 0x140e7d6cd)
USER32.dll
  • BlockInput (Address: 0x140d7b618)
  • CallNextHookEx (Address: 0x140d7b658)
  • EnableWindow (Address: 0x140e7d13a)
  • EnumWindows (Address: 0x140d7b640)
  • GetDlgItem (Address: 0x140d7b650)
  • GetWindowThreadProcessId (Address: 0x140d7b660)
  • MessageBoxA (Address: 0x140d7b638)
  • SendMessageA (Address: 0x140d7b630)
  • SetWindowsHookExA (Address: 0x140d7b628)
  • ShowWindow (Address: 0x140d7b648)
  • UnhookWindowsHookEx (Address: 0x140d7b620)
VCRUNTIME140_1.dll
  • __CxxFrameHandler4 (Address: 0x140e7d36c)
VCRUNTIME140.dll
  • __current_exception_context (Address: 0x140e7d3a2)