asd_2026_x64.dll

Description: GreenLuma

Authors: Steam006

Version: 1.7.3.0

Architecture: 64-bit

Operating System: Windows NT

SHA256: 4bd68813c7e3784c2f065bd13f638d63

File Size: 695.0 KB

Uploaded At: April 1, 2026, 3:13 p.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, WriteProcessMemory

Exported Functions

  • Init (Ordinal: 1, Address: 0x2edb0)

Imported DLLs & Functions

KERNEL32.dll
  • AllocConsole (Address: 0x1800751c0)
  • CloseHandle (Address: 0x180075120)
  • CompareStringW (Address: 0x180075380)
  • CreateDirectoryW (Address: 0x180075020)
  • CreateEventW (Address: 0x1800750d8)
  • CreateFileW (Address: 0x1800750c0)
  • CreateThread (Address: 0x180075138)
  • CreateToolhelp32Snapshot (Address: 0x180075200)
  • DecodePointer (Address: 0x180075158)
  • DeleteCriticalSection (Address: 0x180075180)
  • DeleteFileW (Address: 0x180075110)
  • EncodePointer (Address: 0x1800752c8)
  • EnterCriticalSection (Address: 0x1800752a8)
  • EnumSystemLocalesW (Address: 0x1800753a8)
  • ExitProcess (Address: 0x180075188)
  • ExitThread (Address: 0x180075320)
  • FindClose (Address: 0x1800753b8)
  • FindFirstFileExW (Address: 0x1800753c0)
  • FindNextFileW (Address: 0x1800753c8)
  • FlsAlloc (Address: 0x180075300)
  • FlsFree (Address: 0x180075318)
  • FlsGetValue (Address: 0x180075308)
  • FlsSetValue (Address: 0x180075310)
  • FlushFileBuffers (Address: 0x180075268)
  • FlushInstructionCache (Address: 0x1800751a8)
  • FreeConsole (Address: 0x180075130)
  • FreeEnvironmentStringsW (Address: 0x180075400)
  • FreeLibrary (Address: 0x180075230)
  • FreeLibraryAndExitThread (Address: 0x1800750c8)
  • GetACP (Address: 0x1800753d8)
  • GetCommandLineA (Address: 0x1800753e8)
  • GetCommandLineW (Address: 0x1800753f0)
  • GetConsoleMode (Address: 0x180075360)
  • GetConsoleOutputCP (Address: 0x180075260)
  • GetCPInfo (Address: 0x1800752d8)
  • GetCurrentProcess (Address: 0x180075070)
  • GetCurrentProcessId (Address: 0x180075190)
  • GetCurrentThreadId (Address: 0x1800751e8)
  • GetEnvironmentStringsW (Address: 0x1800753f8)
  • GetEnvironmentVariableA (Address: 0x1800750b0)
  • GetEnvironmentVariableW (Address: 0x1800750a0)
  • GetFileAttributesW (Address: 0x180075218)
  • GetFileSizeEx (Address: 0x180075040)
  • GetFileType (Address: 0x180075378)
  • GetHandleInformation (Address: 0x180075068)
  • GetLastError (Address: 0x1800750f0)
  • GetLocaleInfoW (Address: 0x180075390)
  • GetLocalTime (Address: 0x180075148)
  • GetModuleFileNameW (Address: 0x180075090)
  • GetModuleHandleExW (Address: 0x180075328)
  • GetModuleHandleW (Address: 0x1800751a0)
  • GetNativeSystemInfo (Address: 0x180075128)
  • GetOEMCP (Address: 0x1800753e0)
  • GetPrivateProfileIntW (Address: 0x180075088)
  • GetProcAddress (Address: 0x180075170)
  • GetProcessHeap (Address: 0x180075198)
  • GetProcessId (Address: 0x180075098)
  • GetStartupInfoW (Address: 0x180075028)
  • GetStdHandle (Address: 0x180075370)
  • GetStringTypeW (Address: 0x1800752b8)
  • GetSystemInfo (Address: 0x180075010)
  • GetSystemTimeAsFileTime (Address: 0x180075238)
  • GetThreadContext (Address: 0x180075168)
  • GetTimeZoneInformation (Address: 0x1800753b0)
  • GetUserDefaultLCID (Address: 0x1800753a0)
  • HeapAlloc (Address: 0x180075140)
  • HeapCreate (Address: 0x1800751d0)
  • HeapDestroy (Address: 0x180075160)
  • HeapFree (Address: 0x180075058)
  • HeapReAlloc (Address: 0x180075118)
  • HeapSize (Address: 0x1800750d0)
  • InitializeCriticalSectionEx (Address: 0x1800750a8)
  • InitializeSListHead (Address: 0x180075290)
  • InitializeSRWLock (Address: 0x180075038)
  • InterlockedFlushSList (Address: 0x1800752f8)
  • IsDebuggerPresent (Address: 0x180075298)
  • IsProcessorFeaturePresent (Address: 0x180075350)
  • IsValidCodePage (Address: 0x1800753d0)
  • IsValidLocale (Address: 0x180075398)
  • K32GetModuleBaseNameW (Address: 0x180075100)
  • K32GetModuleFileNameExW (Address: 0x180075210)
  • LCMapStringEx (Address: 0x1800752d0)
  • LCMapStringW (Address: 0x180075388)
  • LeaveCriticalSection (Address: 0x1800752b0)
  • LoadLibraryExA (Address: 0x180075278)
  • LoadLibraryExW (Address: 0x1800751c8)
  • LoadLibraryW (Address: 0x180075228)
  • MultiByteToWideChar (Address: 0x1800750e0)
  • OpenThread (Address: 0x180075208)
  • OutputDebugStringW (Address: 0x1800752a0)
  • QueryPerformanceCounter (Address: 0x180075288)
  • RaiseException (Address: 0x180075220)
  • ReadConsoleW (Address: 0x180075368)
  • ReadFile (Address: 0x180075030)
  • ReleaseSRWLockExclusive (Address: 0x1800750f8)
  • ResumeThread (Address: 0x1800751f8)
  • RtlCaptureContext (Address: 0x180075330)
  • RtlLookupFunctionEntry (Address: 0x1800752e0)
  • RtlPcToFileHeader (Address: 0x1800752f0)
  • RtlUnwind (Address: 0x180075258)
  • RtlUnwindEx (Address: 0x1800752e8)
  • RtlVirtualUnwind (Address: 0x180075338)
  • SetEndOfFile (Address: 0x180075248)
  • SetEnvironmentVariableW (Address: 0x180075270)
  • SetEvent (Address: 0x180075108)
  • SetFilePointerEx (Address: 0x180075358)
  • SetLastError (Address: 0x180075060)
  • SetStdHandle (Address: 0x180075250)
  • SetThreadContext (Address: 0x1800751b8)
  • SetUnhandledExceptionFilter (Address: 0x180075280)
  • Sleep (Address: 0x1800750e8)
  • SuspendThread (Address: 0x1800751f0)
  • TerminateProcess (Address: 0x180075348)
  • Thread32First (Address: 0x1800751e0)
  • Thread32Next (Address: 0x1800751d8)
  • TryAcquireSRWLockExclusive (Address: 0x180075080)
  • UnhandledExceptionFilter (Address: 0x180075340)
  • VirtualAlloc (Address: 0x180075008)
  • VirtualAllocEx (Address: 0x180075178)
  • VirtualFree (Address: 0x180075000)
  • VirtualFreeEx (Address: 0x1800751b0)
  • VirtualProtect (Address: 0x180075050)
  • VirtualProtectEx (Address: 0x180075150)
  • VirtualQuery (Address: 0x180075018)
  • WaitForSingleObject (Address: 0x1800750b8)
  • WideCharToMultiByte (Address: 0x1800752c0)
  • WriteConsoleW (Address: 0x180075240)
  • WriteFile (Address: 0x180075078)
  • WriteProcessMemory (Address: 0x180075048)
ole32.dll
  • CoCreateGuid (Address: 0x180075438)
  • CoCreateInstance (Address: 0x180075410)
  • CoInitializeEx (Address: 0x180075430)
  • CoTaskMemAlloc (Address: 0x180075420)
  • CoUninitialize (Address: 0x180075418)
  • PropVariantClear (Address: 0x180075428)