SLF64.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 4d3901dc9ca64cf66d47044ac085c071

File Size: 95.5 KB

Uploaded At: April 4, 2026, 7:10 a.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, OpenProcess, WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x18000d018)
  • RegCreateKeyExA (Address: 0x18000d008)
  • RegOpenKeyExA (Address: 0x18000d010)
  • RegSetValueExA (Address: 0x18000d000)
KERNEL32.dll
  • CloseHandle (Address: 0x18000d040)
  • CopyFileA (Address: 0x18000d0e8)
  • CreateDirectoryA (Address: 0x18000d118)
  • CreateFileW (Address: 0x18000d128)
  • CreateProcessA (Address: 0x18000d130)
  • CreateToolhelp32Snapshot (Address: 0x18000d090)
  • DeleteCriticalSection (Address: 0x18000d1e8)
  • EnterCriticalSection (Address: 0x18000d1d8)
  • ExitProcess (Address: 0x18000d048)
  • FindClose (Address: 0x18000d258)
  • FindFirstFileExW (Address: 0x18000d260)
  • FindNextFileW (Address: 0x18000d268)
  • FlushFileBuffers (Address: 0x18000d2f8)
  • FreeEnvironmentStringsW (Address: 0x18000d2b0)
  • FreeLibrary (Address: 0x18000d218)
  • GetACP (Address: 0x18000d278)
  • GetCommandLineA (Address: 0x18000d108)
  • GetCommandLineW (Address: 0x18000d290)
  • GetConsoleCP (Address: 0x18000d308)
  • GetConsoleMode (Address: 0x18000d310)
  • GetCPInfo (Address: 0x18000d288)
  • GetCurrentProcess (Address: 0x18000d0b8)
  • GetCurrentProcessId (Address: 0x18000d088)
  • GetCurrentThreadId (Address: 0x18000d190)
  • GetEnvironmentStringsW (Address: 0x18000d2a8)
  • GetFileAttributesA (Address: 0x18000d0e0)
  • GetFileType (Address: 0x18000d2d0)
  • GetLastError (Address: 0x18000d0f8)
  • GetModuleFileNameA (Address: 0x18000d100)
  • GetModuleFileNameW (Address: 0x18000d240)
  • GetModuleHandleA (Address: 0x18000d110)
  • GetModuleHandleExW (Address: 0x18000d238)
  • GetModuleHandleW (Address: 0x18000d1b8)
  • GetOEMCP (Address: 0x18000d280)
  • GetProcAddress (Address: 0x18000d220)
  • GetProcessHeap (Address: 0x18000d2c0)
  • GetStartupInfoW (Address: 0x18000d1b0)
  • GetStdHandle (Address: 0x18000d2c8)
  • GetStringTypeW (Address: 0x18000d2d8)
  • GetSystemTimeAsFileTime (Address: 0x18000d198)
  • GetThreadContext (Address: 0x18000d058)
  • HeapAlloc (Address: 0x18000d248)
  • HeapFree (Address: 0x18000d250)
  • HeapReAlloc (Address: 0x18000d2e8)
  • HeapSize (Address: 0x18000d2e0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18000d1f0)
  • InitializeSListHead (Address: 0x18000d1a0)
  • InterlockedFlushSList (Address: 0x18000d1c8)
  • IsDebuggerPresent (Address: 0x18000d1a8)
  • IsProcessorFeaturePresent (Address: 0x18000d180)
  • IsValidCodePage (Address: 0x18000d270)
  • K32EnumProcessModules (Address: 0x18000d150)
  • K32GetModuleFileNameExA (Address: 0x18000d148)
  • LCMapStringW (Address: 0x18000d2b8)
  • LeaveCriticalSection (Address: 0x18000d1e0)
  • LoadLibraryExA (Address: 0x18000d0f0)
  • LoadLibraryExW (Address: 0x18000d228)
  • LocalAlloc (Address: 0x18000d140)
  • LocalFree (Address: 0x18000d138)
  • lstrcatA (Address: 0x18000d0d8)
  • lstrcmpA (Address: 0x18000d0b0)
  • lstrcpyA (Address: 0x18000d0d0)
  • lstrlenA (Address: 0x18000d0a8)
  • MultiByteToWideChar (Address: 0x18000d298)
  • OpenProcess (Address: 0x18000d0a0)
  • Process32FirstW (Address: 0x18000d098)
  • Process32NextW (Address: 0x18000d0c0)
  • QueryPerformanceCounter (Address: 0x18000d188)
  • RaiseException (Address: 0x18000d230)
  • ReadProcessMemory (Address: 0x18000d060)
  • ResumeThread (Address: 0x18000d070)
  • RtlCaptureContext (Address: 0x18000d158)
  • RtlLookupFunctionEntry (Address: 0x18000d160)
  • RtlUnwindEx (Address: 0x18000d1c0)
  • RtlVirtualUnwind (Address: 0x18000d168)
  • SetEnvironmentVariableA (Address: 0x18000d0c8)
  • SetFilePointerEx (Address: 0x18000d318)
  • SetLastError (Address: 0x18000d1d0)
  • SetStdHandle (Address: 0x18000d2f0)
  • SetUnhandledExceptionFilter (Address: 0x18000d178)
  • TerminateProcess (Address: 0x18000d080)
  • TlsAlloc (Address: 0x18000d1f8)
  • TlsFree (Address: 0x18000d210)
  • TlsGetValue (Address: 0x18000d200)
  • TlsSetValue (Address: 0x18000d208)
  • UnhandledExceptionFilter (Address: 0x18000d170)
  • VirtualAlloc (Address: 0x18000d050)
  • VirtualAllocEx (Address: 0x18000d028)
  • VirtualFreeEx (Address: 0x18000d078)
  • VirtualProtectEx (Address: 0x18000d068)
  • WaitForSingleObject (Address: 0x18000d038)
  • WideCharToMultiByte (Address: 0x18000d2a0)
  • WriteConsoleW (Address: 0x18000d120)
  • WriteFile (Address: 0x18000d300)
  • WriteProcessMemory (Address: 0x18000d030)
SHELL32.dll
  • SHGetFolderPathA (Address: 0x18000d328)
USER32.dll
  • MessageBoxA (Address: 0x18000d338)