SHADOW's-1.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 1cc25d6071332dda63cc1a4038e7bdb3
File Size: 23.0 KB
Uploaded At: March 22, 2026, 12:53 p.m.
Views: 12
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
api-ms-win-crt-heap-l1-1-0.dll
- _callnewh (Address: 0x1800041d8)
- _msize (Address: 0x1800041f0)
- free (Address: 0x1800041e0)
- malloc (Address: 0x1800041e8)
api-ms-win-crt-runtime-l1-1-0.dll
- _beginthreadex (Address: 0x180004240)
- _cexit (Address: 0x180004230)
- _configure_narrow_argv (Address: 0x180004220)
- _crt_atexit (Address: 0x180004208)
- _execute_onexit_table (Address: 0x180004260)
- _initialize_narrow_environment (Address: 0x180004218)
- _initialize_onexit_table (Address: 0x180004210)
- _initterm (Address: 0x180004200)
- _initterm_e (Address: 0x180004238)
- _invoke_watson (Address: 0x180004250)
- _register_onexit_function (Address: 0x180004248)
- _seh_filter_dll (Address: 0x180004228)
- terminate (Address: 0x180004258)
api-ms-win-crt-string-l1-1-0.dll
- _wcsicmp (Address: 0x180004270)
KERNEL32.dll
- Beep (Address: 0x180004028)
- CloseHandle (Address: 0x180004018)
- CreateToolhelp32Snapshot (Address: 0x180004000)
- GetCurrentProcess (Address: 0x180004070)
- GetCurrentProcessId (Address: 0x180004098)
- GetCurrentThreadId (Address: 0x1800040a0)
- GetSystemInfo (Address: 0x180004020)
- GetSystemTimeAsFileTime (Address: 0x1800040a8)
- InitializeSListHead (Address: 0x1800040b0)
- IsDebuggerPresent (Address: 0x180004088)
- IsProcessorFeaturePresent (Address: 0x180004080)
- OpenProcess (Address: 0x180004040)
- Process32FirstW (Address: 0x180004008)
- Process32NextW (Address: 0x180004010)
- QueryPerformanceCounter (Address: 0x180004090)
- ReadProcessMemory (Address: 0x180004030)
- RtlCaptureContext (Address: 0x1800040b8)
- RtlLookupFunctionEntry (Address: 0x180004050)
- RtlVirtualUnwind (Address: 0x180004058)
- SetUnhandledExceptionFilter (Address: 0x180004068)
- TerminateProcess (Address: 0x180004078)
- UnhandledExceptionFilter (Address: 0x180004060)
- VirtualQueryEx (Address: 0x180004048)
- WriteProcessMemory (Address: 0x180004038)
MSVCP140.dll
- _Cnd_do_broadcast_at_thread_exit (Address: 0x180004140)
- _Thrd_detach (Address: 0x180004118)
- ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ (Address: 0x180004110)
- ?_Throw_Cpp_error@std@@YAXH@Z (Address: 0x180004100)
- ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x180004120)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z (Address: 0x1800040f0)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z (Address: 0x180004130)
- ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A (Address: 0x180004128)
- ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ (Address: 0x1800040e8)
- ?good@ios_base@std@@QEBA_NXZ (Address: 0x1800040f8)
- ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z (Address: 0x1800040e0)
- ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z (Address: 0x180004108)
- ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z (Address: 0x1800040d0)
- ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z (Address: 0x1800040d8)
- ?uncaught_exception@std@@YA_NXZ (Address: 0x180004138)
- ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z (Address: 0x1800040c8)
ntdll.dll
- ZwReadVirtualMemory (Address: 0x180004280)
USER32.dll
- GetAsyncKeyState (Address: 0x180004168)
- GetMessageW (Address: 0x180004158)
- RegisterHotKey (Address: 0x180004150)
- UnregisterHotKey (Address: 0x180004160)
VCRUNTIME140_1.dll
- __CxxFrameHandler4 (Address: 0x1800041c8)
VCRUNTIME140.dll
- __C_specific_handler (Address: 0x1800041b0)
- __std_exception_copy (Address: 0x180004178)
- __std_exception_destroy (Address: 0x180004190)
- __std_terminate (Address: 0x1800041a0)
- __std_type_info_destroy_list (Address: 0x180004198)
- _CxxThrowException (Address: 0x180004180)
- memcpy (Address: 0x180004188)
- memmove (Address: 0x1800041b8)
- memset (Address: 0x1800041a8)