IOC Report
ShadowFury.exe

loading gif

Files

File Path
Type
Category
Malicious
ShadowFury.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\D3DSCache\a5ae4d5e940ad976\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\a5ae4d5e940ad976\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\D3DSCache\a5ae4d5e940ad976\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
modified
C:\Users\user\AppData\Local\Programs\ShadowFury\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\ffmpeg.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\resources.pak
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\ShadowFury\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\65009a31-e18f-4331-be2b-a374113ace84.tmp.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\6f9c7dcb-c5ec-4d75-b81c-93e1fcff8c95.tmp.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wqgek32.5bo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_befqev12.yp0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bfzby2tn.dti.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bp5zyjii.nj3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csboxvu0.vp4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_euaxoon1.utp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbcndarq.3cq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqeemgkq.tmi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjride20.aha.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nfpbmemr.4in.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oh5to30c.2rc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovpyas1j.143.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_paaopvor.qvp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qia5zjfx.s0j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvmutyrc.fwo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stre2n4a.5iq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1sbwzmi.jg3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxj3fnhu.bhr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1sns1et.j1b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zpkphbdv.kid.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\c72e6d37-050a-4632-91c0-63b85d93d972.tmp.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ece2b052-aa6a-477b-a28f-4a0581807657.tmp.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\ShadowFury.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\ffmpeg.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\resources\elevate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\7z-out\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\SpiderBanner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\app-32.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsqECAB.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\ShadowFury\4d92a671-e7a3-4c89-bc91-bed1c44b947d.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\ShadowFury\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\ShadowFury\Local State~RF41a1b2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\ShadowFury\e90be693-0797-4479-93e1-bf26b23be5af.tmp
JSON data
modified
There are 123 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 --field-trial-handle=1976,i,5983286272222929098,2111862597278059386,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --mojo-platform-channel-handle=2136 --field-trial-handle=1976,i,5983286272222929098,2111862597278059386,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 --field-trial-handle=1972,i,18180359127166526210,17872614602038801051,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --mojo-platform-channel-handle=2164 --field-trial-handle=1972,i,18180359127166526210,17872614602038801051,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1976,i,5983286272222929098,2111862597278059386,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe
"C:\Users\user\AppData\Local\Programs\ShadowFury\ShadowFury.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\user\AppData\Roaming\ShadowFury" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1444 --field-trial-handle=1972,i,18180359127166526210,17872614602038801051,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\Desktop\ShadowFury.exe
"C:\Users\user\Desktop\ShadowFury.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "chcp"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "chcp"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\findstr.exe
findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\findstr.exe
findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://sqlite.org/forum/forumpost/eb8613976a
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
https://github.com/sebhildebrandt/systeminformation.git
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://github.com/nodejs/node/pull/35941
unknown
https://www.chromestatus.com/feature/5093566007214080
unknown
https://console.spec.whatwg.org/#table
unknown
https://github.com/nodejs/string_decoder
unknown
https://docs.google.com/
unknown
https://crbug.com/1356053
unknown
https://elinux.org/RPI_vcgencmd_usage
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3C//DTD
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
http://crbug.com/110263
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
https://www.chromium.org/blink/origin-trials/portals.
unknown
http://anglebug.com/6929
unknown
https://semver.org/
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://chromium.googlesource.com/chromium/src/
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.chromium.org/blink/origin-trials/portals.The
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://bit.ly/3rpDuEX.
unknown
https://crbug.com/593024
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
https://w3c.github.io/manifest/#installability-signals
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
http://exslt.org/common
unknown
https://github.com/tensorflow/models
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://c.docs.google.com/
unknown
https://github.com/KhronosGroup/SPIRV-Headers.git
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://www.sqlite.org/src/info/908f001483982c43
unknown
https://tc39.es/ecma262/#sec-timeclip
unknown
https://issuetracker.google.com/161903006
unknown
http://127.0.0.1
unknown
https://crbug.com/1300575
unknown
https://github.com/nodejs/node/pull/33661
unknown
http://www.nongnu.org/freebangfont/downloads.html#mukti
unknown
https://crbug.com/710443
unknown
http://narwhaljs.org)
unknown
http://istanbul-js.org/
unknown
https://github.com/tensorflow/tflite-support
unknown
https://github.com/WICG/scheduling-apis
unknown
https://sqlite.org/
unknown
https://crbug.com/1060012
unknown
http://localhosthttp://127.0.0.1object-src
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://anglebug.com/3997
unknown
http://anglebug.com/4722
unknown
http://crbug.com/642605
unknown
https://fetch.spec.whatwg.org/#fetch-timing-info
unknown
http://anglebug.com/1452
unknown
https://webassembly.github.io/spec/web-api
unknown
https://github.com/electron/electron/issues/18397.Module
unknown
http://www.xfa.org/schema/xdc/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
http://www.sqlite.org/
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://crbug.com/650547callClearTwiceUsing
unknown
https://github.com/npm/node-tar/issues/183
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://gitlab.freedesktop.org/xdg/xdgmime
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://www.unicode.org/copyright.html
unknown
https://beacons.gcp.gvt2.com/domainreliability/upload
unknown
http://anglebug.com/2894
unknown
http://anglebug.com/3862
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://developer.chrome.com/docs/extensions/mv3/cross-origin-isolation/.
unknown
https://github.com/WICG/construct-stylesheets/issues/119#issuecomment-588352418.
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
https://github.com/w3c/webappsec-trusted-types/wiki/Trusted-Types-for-function-constructor
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://github.com/wasdk/wasmparser
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
http://www.xfa.org/schema/xfa-template/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
ipinfo.io
34.117.186.192
illitluckygirl.com
unknown

IPs

IP
Domain
Country
Malicious
34.117.186.192
ipinfo.io
United States
162.159.61.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\d8b49fe8-42ea-5121-a0ba-899ad0437a85
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\d8b49fe8-42ea-5121-a0ba-899ad0437a85
KeepShortcuts
HKEY_CURRENT_USER\SOFTWARE\d8b49fe8-42ea-5121-a0ba-899ad0437a85
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d8b49fe8-42ea-5121-a0ba-899ad0437a85
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8D6000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
2E21000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
2D2D000
stack
page read and write
6370000
heap
page read and write
6970000
direct allocation
page read and write
5729000
heap
page read and write
3DB1000
unkown
page execute read
72D7000
unkown
page readonly
60B0000
heap
page read and write
8D6000
heap
page read and write
1B0000
unkown
page readonly
5728000
heap
page read and write
8DC000
heap
page read and write
5868000
heap
page read and write
2A6D000
stack
page read and write
6C74000
unkown
page readonly
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
61F0000
heap
page read and write
2F2F000
heap
page read and write
884000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
742B000
unkown
page readonly
3DB1000
unkown
page execute read
72CC000
unkown
page readonly
6031000
heap
page read and write
5020000
direct allocation
page read and write
3DB1000
unkown
page execute read
8D6000
heap
page read and write
8DC000
heap
page read and write
60F0000
heap
page read and write
8DC000
heap
page read and write
899000
heap
page read and write
7432000
unkown
page readonly
8D6000
heap
page read and write
7462000
unkown
page readonly
50A0000
direct allocation
page read and write
8DC000
heap
page read and write
742B000
unkown
page readonly
8DC000
heap
page read and write
8DC000
heap
page read and write
87C000
heap
page read and write
8DC000
heap
page read and write
850F000
unkown
page readonly
5728000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
5560000
heap
page read and write
1B1000
unkown
page execute read
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
57E8000
heap
page read and write
60F0000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
6830000
direct allocation
page read and write
2DA0000
heap
page read and write
2D90000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
2EA1000
heap
page read and write
5521000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
6EB0000
direct allocation
page read and write
56A1000
heap
page read and write
8DC000
heap
page read and write
72BD000
unkown
page readonly
8DC000
heap
page read and write
8DC000
heap
page read and write
5660000
heap
page read and write
57A3000
heap
page read and write
8B0000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
56A0000
heap
page read and write
5728000
heap
page read and write
3185000
heap
page read and write
8D6000
heap
page read and write
55A0000
heap
page read and write
8D6000
heap
page read and write
1FB1000
unkown
page execute read
8D6000
heap
page read and write
8D6000
heap
page read and write
5620000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
6132000
heap
page read and write
1B0000
unkown
page readonly
7460000
unkown
page readonly
7462000
unkown
page readonly
8D6000
heap
page read and write
7537000
direct allocation
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
89C000
heap
page read and write
61B1000
heap
page read and write
8D6000
heap
page read and write
15B1000
unkown
page execute read
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
6C7D000
unkown
page readonly
BB1000
unkown
page execute read
55E0000
heap
page read and write
8A8000
heap
page read and write
8D6000
heap
page read and write
40A000
unkown
page write copy
62F0000
heap
page read and write
8DC000
heap
page read and write
6330000
heap
page read and write
72B7000
unkown
page readonly
8DC000
heap
page read and write
8D6000
heap
page read and write
55A1000
heap
page read and write
5450000
direct allocation
page read and write
8DC000
heap
page read and write
62B1000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
5829000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
4D60000
direct allocation
page read and write
8D6000
heap
page read and write
898000
heap
page read and write
3183000
heap
page read and write
8DC000
heap
page read and write
15B1000
unkown
page execute read
8D6000
heap
page read and write
8DC000
heap
page read and write
5728000
heap
page read and write
60B1000
heap
page read and write
8DC000
heap
page read and write
8B0000
heap
page read and write
8D6000
heap
page read and write
5728000
heap
page read and write
8DC000
heap
page read and write
6230000
heap
page read and write
8D6000
heap
page read and write
2B10000
heap
page read and write
2CF0000
direct allocation
page read and write
8DC000
heap
page read and write
62B2000
heap
page read and write
8DC000
heap
page read and write
2D21000
heap
page read and write
8D6000
heap
page read and write
60B1000
heap
page read and write
5823000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DF000
heap
page read and write
8DC000
heap
page read and write
5828000
heap
page read and write
8D6000
heap
page read and write
56A0000
heap
page read and write
8DC000
heap
page read and write
5920000
direct allocation
page read and write
8D6000
heap
page read and write
58A9000
heap
page read and write
47B1000
unkown
page execute read
5020000
heap
page read and write
5661000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
850E000
unkown
page execute read
8D6000
heap
page read and write
8D6000
heap
page read and write
6332000
heap
page read and write
8A1000
heap
page read and write
401000
unkown
page execute read
6170000
heap
page read and write
8D6000
heap
page read and write
2C74000
heap
page read and write
BB1000
unkown
page execute read
8D6000
heap
page read and write
7432000
unkown
page readonly
5862000
heap
page read and write
8DC000
heap
page read and write
56A0000
heap
page read and write
62F1000
heap
page read and write
61B0000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
2CF8000
heap
page read and write
6C85000
unkown
page readonly
5029000
heap
page read and write
33B1000
unkown
page execute read
8DC000
heap
page read and write
8DC000
heap
page read and write
72B7000
unkown
page readonly
15B1000
unkown
page execute read
2E1F000
stack
page read and write
72AC000
unkown
page readonly
6070000
heap
page read and write
8A8000
heap
page read and write
8DC000
heap
page read and write
7447000
unkown
page readonly
8DC000
heap
page read and write
8DC000
heap
page read and write
5722000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
61B1000
heap
page read and write
8DC000
heap
page read and write
896000
heap
page read and write
5728000
heap
page read and write
5822000
heap
page read and write
55A0000
heap
page read and write
2C74000
heap
page read and write
7E5F000
unkown
page readonly
8A0000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8E9000
heap
page read and write
65B1000
unkown
page execute read
850F000
unkown
page readonly
2D5E000
stack
page read and write
72C1000
unkown
page readonly
2E20000
heap
page read and write
8DC000
heap
page read and write
72AC000
unkown
page readonly
2DDE000
stack
page read and write
2C74000
heap
page read and write
6070000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
850B000
unkown
page execute read
3660000
heap
page read and write
5BB1000
unkown
page execute read
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
6271000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
72D7000
unkown
page readonly
515E000
direct allocation
page read and write
2DE0000
heap
page read and write
1B1000
unkown
page execute read
1FB1000
unkown
page execute read
5120000
direct allocation
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
29B1000
unkown
page execute read
8B0000
heap
page read and write
8DC000
heap
page read and write
33B1000
unkown
page execute read
51B1000
unkown
page execute read
313E000
stack
page read and write
47B1000
unkown
page execute read
61F0000
heap
page read and write
896000
heap
page read and write
8DC000
heap
page read and write
850E000
unkown
page execute read
812A000
unkown
page write copy
5E20000
direct allocation
page read and write
8D6000
heap
page read and write
5621000
heap
page read and write
8D6000
heap
page read and write
1FB1000
unkown
page execute read
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
5C20000
direct allocation
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
65B1000
unkown
page execute read
63B0000
heap
page read and write
8DC000
heap
page read and write
8F5000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
2C00000
heap
page read and write
2BF0000
trusted library allocation
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
33B1000
unkown
page execute read
8DC000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8141000
unkown
page write copy
8D6000
heap
page read and write
62B1000
heap
page read and write
8DC000
heap
page read and write
6C85000
unkown
page readonly
8DC000
heap
page read and write
6270000
heap
page read and write
7E5F000
unkown
page readonly
8DC000
heap
page read and write
8A0000
heap
page read and write
72BD000
unkown
page readonly
72E1000
unkown
page readonly
5123000
heap
page read and write
56A1000
heap
page read and write
3182000
heap
page read and write
8DC000
heap
page read and write
2D21000
heap
page read and write
8D6000
heap
page read and write
2C33000
heap
page read and write
57A8000
heap
page read and write
2CF0000
direct allocation
page read and write
742E000
unkown
page readonly
1B1000
unkown
page execute read
8DC000
heap
page read and write
8D6000
heap
page read and write
5233000
heap
page read and write
5BB1000
unkown
page execute read
8D6000
heap
page read and write
54D0000
direct allocation
page read and write
8E3000
heap
page read and write
562A000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
2DF0000
heap
page read and write
5026000
heap
page read and write
60F0000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
60F1000
heap
page read and write
8D6000
heap
page read and write
7460000
unkown
page readonly
73F0000
direct allocation
page read and write
2F90000
heap
page read and write
8DC000
heap
page read and write
6371000
heap
page read and write
8DC000
heap
page read and write
817D000
unkown
page write copy
8D6000
heap
page read and write
352F000
stack
page read and write
8D6000
heap
page read and write
29B1000
unkown
page execute read
8A8000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
2DA0000
heap
page read and write
29B1000
unkown
page execute read
8B0000
heap
page read and write
5728000
heap
page read and write
342F000
unkown
page read and write
6970000
direct allocation
page read and write
8A8000
heap
page read and write
5822000
heap
page read and write
8E9000
heap
page read and write
57A9000
heap
page read and write
61F1000
heap
page read and write
8E9000
heap
page read and write
72E1000
unkown
page readonly
8DC000
heap
page read and write
5521000
heap
page read and write
8DC000
heap
page read and write
15B1000
unkown
page execute read
2DE0000
heap
page read and write
8D6000
heap
page read and write
817D000
unkown
page write copy
8DC000
heap
page read and write
5C20000
direct allocation
page read and write
3160000
heap
page read and write
62F1000
heap
page read and write
8DC000
heap
page read and write
5025000
heap
page read and write
6C30000
direct allocation
page read and write
2EA1000
heap
page read and write
850B000
unkown
page execute read
8D6000
heap
page read and write
8A1000
heap
page read and write
59B000
unkown
page readonly
57A2000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
5228000
heap
page read and write
2C34000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
58A9000
heap
page read and write
2D9F000
stack
page read and write
8141000
unkown
page write copy
8D6000
heap
page read and write
5560000
heap
page read and write
2C20000
heap
page read and write
8D6000
heap
page read and write
5722000
heap
page read and write
742E000
unkown
page readonly
8D6000
heap
page read and write
8A0000
heap
page read and write
1B1000
unkown
page execute read
51B1000
unkown
page execute read
60B1000
heap
page read and write
6C74000
unkown
page readonly
8D6000
heap
page read and write
5728000
heap
page read and write
8A1000
heap
page read and write
8D6000
heap
page read and write
2C34000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
56A0000
heap
page read and write
6131000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
BB1000
unkown
page execute read
1B0000
unkown
page readonly
8D6000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
60F1000
heap
page read and write
8A0000
heap
page read and write
316A000
heap
page read and write
8A0000
heap
page read and write
55E0000
heap
page read and write
56A0000
heap
page read and write
56A0000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
2DA1000
heap
page read and write
1B0000
unkown
page readonly
5622000
heap
page read and write
8DF000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
8A0000
heap
page read and write
8DC000
heap
page read and write
7447000
unkown
page readonly
8DC000
heap
page read and write
52CA000
direct allocation
page read and write
61F1000
heap
page read and write
8DC000
heap
page read and write
8B0000
heap
page read and write
534D000
heap
page read and write
8D6000
heap
page read and write
408000
unkown
page readonly
8D6000
heap
page read and write
887000
heap
page read and write
5560000
heap
page read and write
47B1000
unkown
page execute read
8DC000
heap
page read and write
8B0000
heap
page read and write
8DC000
heap
page read and write
2DDE000
unkown
page read and write
60F0000
heap
page read and write
30FD000
stack
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
56A0000
heap
page read and write
2AAD000
stack
page read and write
8D6000
heap
page read and write
BB1000
unkown
page execute read
8A0000
heap
page read and write
502D000
heap
page read and write
8D6000
heap
page read and write
55A1000
heap
page read and write
5222000
heap
page read and write
6031000
heap
page read and write
5723000
heap
page read and write
72CC000
unkown
page readonly
8DC000
heap
page read and write
5662000
heap
page read and write
8D6000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
8A8000
heap
page read and write
8D6000
heap
page read and write
6230000
heap
page read and write
2B20000
heap
page read and write
8D6000
heap
page read and write
400000
unkown
page readonly
8D6000
heap
page read and write
2C2D000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
5822000
heap
page read and write
2C27000
heap
page read and write
812A000
unkown
page write copy
72C1000
unkown
page readonly
6C7D000
unkown
page readonly
8DC000
heap
page read and write
8DC000
heap
page read and write
8DC000
heap
page read and write
87C000
heap
page read and write
5728000
heap
page read and write
56E0000
heap
page read and write
8B0000
heap
page read and write
768F000
direct allocation
page read and write
8D6000
heap
page read and write
57E2000
heap
page read and write
8DC000
heap
page read and write
8D6000
heap
page read and write
5721000
heap
page read and write
6130000
heap
page read and write
There are 521 hidden memdumps, click here to show them.