SLF64.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 4d3901dc9ca64cf66d47044ac085c071
File Size: 95.5 KB
Uploaded At: April 4, 2026, 7:10 a.m.
Views: 12
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, OpenProcess, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x18000d018)
- RegCreateKeyExA (Address: 0x18000d008)
- RegOpenKeyExA (Address: 0x18000d010)
- RegSetValueExA (Address: 0x18000d000)
KERNEL32.dll
- CloseHandle (Address: 0x18000d040)
- CopyFileA (Address: 0x18000d0e8)
- CreateDirectoryA (Address: 0x18000d118)
- CreateFileW (Address: 0x18000d128)
- CreateProcessA (Address: 0x18000d130)
- CreateToolhelp32Snapshot (Address: 0x18000d090)
- DeleteCriticalSection (Address: 0x18000d1e8)
- EnterCriticalSection (Address: 0x18000d1d8)
- ExitProcess (Address: 0x18000d048)
- FindClose (Address: 0x18000d258)
- FindFirstFileExW (Address: 0x18000d260)
- FindNextFileW (Address: 0x18000d268)
- FlushFileBuffers (Address: 0x18000d2f8)
- FreeEnvironmentStringsW (Address: 0x18000d2b0)
- FreeLibrary (Address: 0x18000d218)
- GetACP (Address: 0x18000d278)
- GetCommandLineA (Address: 0x18000d108)
- GetCommandLineW (Address: 0x18000d290)
- GetConsoleCP (Address: 0x18000d308)
- GetConsoleMode (Address: 0x18000d310)
- GetCPInfo (Address: 0x18000d288)
- GetCurrentProcess (Address: 0x18000d0b8)
- GetCurrentProcessId (Address: 0x18000d088)
- GetCurrentThreadId (Address: 0x18000d190)
- GetEnvironmentStringsW (Address: 0x18000d2a8)
- GetFileAttributesA (Address: 0x18000d0e0)
- GetFileType (Address: 0x18000d2d0)
- GetLastError (Address: 0x18000d0f8)
- GetModuleFileNameA (Address: 0x18000d100)
- GetModuleFileNameW (Address: 0x18000d240)
- GetModuleHandleA (Address: 0x18000d110)
- GetModuleHandleExW (Address: 0x18000d238)
- GetModuleHandleW (Address: 0x18000d1b8)
- GetOEMCP (Address: 0x18000d280)
- GetProcAddress (Address: 0x18000d220)
- GetProcessHeap (Address: 0x18000d2c0)
- GetStartupInfoW (Address: 0x18000d1b0)
- GetStdHandle (Address: 0x18000d2c8)
- GetStringTypeW (Address: 0x18000d2d8)
- GetSystemTimeAsFileTime (Address: 0x18000d198)
- GetThreadContext (Address: 0x18000d058)
- HeapAlloc (Address: 0x18000d248)
- HeapFree (Address: 0x18000d250)
- HeapReAlloc (Address: 0x18000d2e8)
- HeapSize (Address: 0x18000d2e0)
- InitializeCriticalSectionAndSpinCount (Address: 0x18000d1f0)
- InitializeSListHead (Address: 0x18000d1a0)
- InterlockedFlushSList (Address: 0x18000d1c8)
- IsDebuggerPresent (Address: 0x18000d1a8)
- IsProcessorFeaturePresent (Address: 0x18000d180)
- IsValidCodePage (Address: 0x18000d270)
- K32EnumProcessModules (Address: 0x18000d150)
- K32GetModuleFileNameExA (Address: 0x18000d148)
- LCMapStringW (Address: 0x18000d2b8)
- LeaveCriticalSection (Address: 0x18000d1e0)
- LoadLibraryExA (Address: 0x18000d0f0)
- LoadLibraryExW (Address: 0x18000d228)
- LocalAlloc (Address: 0x18000d140)
- LocalFree (Address: 0x18000d138)
- lstrcatA (Address: 0x18000d0d8)
- lstrcmpA (Address: 0x18000d0b0)
- lstrcpyA (Address: 0x18000d0d0)
- lstrlenA (Address: 0x18000d0a8)
- MultiByteToWideChar (Address: 0x18000d298)
- OpenProcess (Address: 0x18000d0a0)
- Process32FirstW (Address: 0x18000d098)
- Process32NextW (Address: 0x18000d0c0)
- QueryPerformanceCounter (Address: 0x18000d188)
- RaiseException (Address: 0x18000d230)
- ReadProcessMemory (Address: 0x18000d060)
- ResumeThread (Address: 0x18000d070)
- RtlCaptureContext (Address: 0x18000d158)
- RtlLookupFunctionEntry (Address: 0x18000d160)
- RtlUnwindEx (Address: 0x18000d1c0)
- RtlVirtualUnwind (Address: 0x18000d168)
- SetEnvironmentVariableA (Address: 0x18000d0c8)
- SetFilePointerEx (Address: 0x18000d318)
- SetLastError (Address: 0x18000d1d0)
- SetStdHandle (Address: 0x18000d2f0)
- SetUnhandledExceptionFilter (Address: 0x18000d178)
- TerminateProcess (Address: 0x18000d080)
- TlsAlloc (Address: 0x18000d1f8)
- TlsFree (Address: 0x18000d210)
- TlsGetValue (Address: 0x18000d200)
- TlsSetValue (Address: 0x18000d208)
- UnhandledExceptionFilter (Address: 0x18000d170)
- VirtualAlloc (Address: 0x18000d050)
- VirtualAllocEx (Address: 0x18000d028)
- VirtualFreeEx (Address: 0x18000d078)
- VirtualProtectEx (Address: 0x18000d068)
- WaitForSingleObject (Address: 0x18000d038)
- WideCharToMultiByte (Address: 0x18000d2a0)
- WriteConsoleW (Address: 0x18000d120)
- WriteFile (Address: 0x18000d300)
- WriteProcessMemory (Address: 0x18000d030)
SHELL32.dll
- SHGetFolderPathA (Address: 0x18000d328)
USER32.dll
- MessageBoxA (Address: 0x18000d338)