xweb_elf.dll

Description: WeChat

Authors: Copyright (C) 2025 Tencent WeChat Team. All rights reserved.

Version: 2.3.5.16965

Architecture: 64-bit

Operating System: Windows

SHA256: 3351bec8b7204acbcb58a33a458219b7

File Size: 1.2 MB

Uploaded At: Dec. 4, 2025, 6:18 a.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread

Exported Functions

  • ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xba950)
  • CrashForException_ExportThunk (Ordinal: 2, Address: 0xba8e0)
  • DisableHook (Ordinal: 3, Address: 0xba440)
  • DrainLog (Ordinal: 4, Address: 0x1c2e0)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xba960)
  • DumpProcessWithoutCrash (Ordinal: 6, Address: 0xba3c0)
  • GetApplyHookResult (Ordinal: 7, Address: 0x1bca0)
  • GetBlockedModulesCount (Ordinal: 8, Address: 0xba5a0)
  • GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xba800)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xba940)
  • GetHandleVerifier (Ordinal: 11, Address: 0x39ae0)
  • GetUniqueBlockedModulesCount (Ordinal: 12, Address: 0xba5b0)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 13, Address: 0xba910)
  • IsBrowserProcess (Ordinal: 14, Address: 0x1ab80)
  • IsExtensionPointDisableSet (Ordinal: 15, Address: 0x1ab90)
  • IsThirdPartyInitialized (Ordinal: 16, Address: 0x1cee0)
  • RegisterLogNotification (Ordinal: 17, Address: 0x1c9f0)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 18, Address: 0xba7a0)
  • SetMetricsClientId (Ordinal: 19, Address: 0xba3d0)
  • SetUploadConsent_ExportThunk (Ordinal: 20, Address: 0xba900)
  • SignalInitializeCrashReporting (Ordinal: 21, Address: 0x1ab00)
  • SignalXWebElf (Ordinal: 22, Address: 0x1ab10)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180111de8)
  • CloseHandle (Address: 0x180111df0)
  • CompareStringW (Address: 0x180111df8)
  • CreateDirectoryW (Address: 0x180111e00)
  • CreateEventW (Address: 0x180111e08)
  • CreateFileW (Address: 0x180111e10)
  • CreateMutexW (Address: 0x180111e18)
  • CreateRemoteThread (Address: 0x180111e20)
  • CreateThread (Address: 0x180111e28)
  • DeleteCriticalSection (Address: 0x180111e30)
  • DeleteFileW (Address: 0x180111e38)
  • DuplicateHandle (Address: 0x180111e40)
  • EncodePointer (Address: 0x180111e48)
  • EnterCriticalSection (Address: 0x180111e50)
  • EnumSystemLocalesW (Address: 0x180111e58)
  • ExitProcess (Address: 0x180111e60)
  • ExpandEnvironmentStringsW (Address: 0x180111e68)
  • FileTimeToSystemTime (Address: 0x180111e70)
  • FindClose (Address: 0x180111e78)
  • FindFirstFileExW (Address: 0x180111e80)
  • FindNextFileW (Address: 0x180111e88)
  • FlsAlloc (Address: 0x180111e90)
  • FlsFree (Address: 0x180111e98)
  • FlsGetValue (Address: 0x180111ea0)
  • FlsSetValue (Address: 0x180111ea8)
  • FlushFileBuffers (Address: 0x180111eb0)
  • FormatMessageW (Address: 0x180111eb8)
  • FreeEnvironmentStringsW (Address: 0x180111ec0)
  • FreeLibrary (Address: 0x180111ec8)
  • GetACP (Address: 0x180111ed0)
  • GetCommandLineA (Address: 0x180111ee0)
  • GetCommandLineW (Address: 0x180111ee8)
  • GetConsoleMode (Address: 0x180111ef0)
  • GetConsoleOutputCP (Address: 0x180111ef8)
  • GetCPInfo (Address: 0x180111ed8)
  • GetCurrentDirectoryW (Address: 0x180111f00)
  • GetCurrentProcess (Address: 0x180111f08)
  • GetCurrentProcessId (Address: 0x180111f10)
  • GetCurrentThread (Address: 0x180111f18)
  • GetCurrentThreadId (Address: 0x180111f20)
  • GetDateFormatW (Address: 0x180111f28)
  • GetDriveTypeW (Address: 0x180111f30)
  • GetEnvironmentStringsW (Address: 0x180111f38)
  • GetEnvironmentVariableW (Address: 0x180111f40)
  • GetFileAttributesW (Address: 0x180111f48)
  • GetFileInformationByHandle (Address: 0x180111f50)
  • GetFileSizeEx (Address: 0x180111f58)
  • GetFileTime (Address: 0x180111f60)
  • GetFileType (Address: 0x180111f68)
  • GetFullPathNameW (Address: 0x180111f70)
  • GetLastError (Address: 0x180111f78)
  • GetLocaleInfoW (Address: 0x180111f88)
  • GetLocalTime (Address: 0x180111f80)
  • GetLongPathNameW (Address: 0x180111f90)
  • GetModuleFileNameW (Address: 0x180111f98)
  • GetModuleHandleA (Address: 0x180111fa0)
  • GetModuleHandleExW (Address: 0x180111fa8)
  • GetModuleHandleW (Address: 0x180111fb0)
  • GetNativeSystemInfo (Address: 0x180111fb8)
  • GetOEMCP (Address: 0x180111fc0)
  • GetProcAddress (Address: 0x180111fc8)
  • GetProcessHeap (Address: 0x180111fd0)
  • GetProcessId (Address: 0x180111fd8)
  • GetProductInfo (Address: 0x180111fe0)
  • GetStartupInfoW (Address: 0x180111fe8)
  • GetStdHandle (Address: 0x180111ff0)
  • GetStringTypeW (Address: 0x180111ff8)
  • GetSystemDirectoryW (Address: 0x180112000)
  • GetSystemInfo (Address: 0x180112008)
  • GetSystemTimeAsFileTime (Address: 0x180112010)
  • GetTempPathW (Address: 0x180112018)
  • GetThreadPriority (Address: 0x180112020)
  • GetTickCount (Address: 0x180112028)
  • GetTimeFormatW (Address: 0x180112030)
  • GetTimeZoneInformation (Address: 0x180112038)
  • GetUserDefaultLCID (Address: 0x180112040)
  • GetVersionExW (Address: 0x180112048)
  • GetWindowsDirectoryW (Address: 0x180112050)
  • GlobalMemoryStatusEx (Address: 0x180112058)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180112068)
  • InitializeSListHead (Address: 0x180112070)
  • InitOnceExecuteOnce (Address: 0x180112060)
  • InterlockedFlushSList (Address: 0x180112078)
  • IsDebuggerPresent (Address: 0x180112080)
  • IsProcessorFeaturePresent (Address: 0x180112088)
  • IsValidCodePage (Address: 0x180112090)
  • IsValidLocale (Address: 0x180112098)
  • IsWow64Process (Address: 0x1801120a0)
  • K32GetMappedFileNameW (Address: 0x1801120a8)
  • LCMapStringW (Address: 0x1801120b0)
  • LeaveCriticalSection (Address: 0x1801120b8)
  • LoadLibraryExA (Address: 0x1801120c0)
  • LoadLibraryExW (Address: 0x1801120c8)
  • LocalFree (Address: 0x1801120d0)
  • LockFileEx (Address: 0x1801120d8)
  • MultiByteToWideChar (Address: 0x1801120e0)
  • OutputDebugStringA (Address: 0x1801120e8)
  • PeekNamedPipe (Address: 0x1801120f0)
  • QueryPerformanceCounter (Address: 0x1801120f8)
  • QueryPerformanceFrequency (Address: 0x180112100)
  • QueryThreadCycleTime (Address: 0x180112108)
  • RaiseException (Address: 0x180112110)
  • ReadConsoleW (Address: 0x180112118)
  • ReadFile (Address: 0x180112120)
  • ReadProcessMemory (Address: 0x180112128)
  • ReleaseMutex (Address: 0x180112130)
  • ReleaseSRWLockExclusive (Address: 0x180112138)
  • RemoveDirectoryW (Address: 0x180112140)
  • RemoveVectoredExceptionHandler (Address: 0x180112148)
  • ResetEvent (Address: 0x180112150)
  • RtlCaptureContext (Address: 0x180112158)
  • RtlCaptureStackBackTrace (Address: 0x180112160)
  • RtlLookupFunctionEntry (Address: 0x180112168)
  • RtlPcToFileHeader (Address: 0x180112170)
  • RtlUnwind (Address: 0x180112178)
  • RtlUnwindEx (Address: 0x180112180)
  • RtlVirtualUnwind (Address: 0x180112188)
  • SetEndOfFile (Address: 0x180112190)
  • SetEnvironmentVariableW (Address: 0x180112198)
  • SetEvent (Address: 0x1801121a0)
  • SetFilePointerEx (Address: 0x1801121a8)
  • SetLastError (Address: 0x1801121b0)
  • SetStdHandle (Address: 0x1801121b8)
  • SetThreadPriority (Address: 0x1801121c0)
  • SetUnhandledExceptionFilter (Address: 0x1801121c8)
  • Sleep (Address: 0x1801121d0)
  • SleepConditionVariableSRW (Address: 0x1801121d8)
  • SleepEx (Address: 0x1801121e0)
  • SwitchToThread (Address: 0x1801121e8)
  • SystemTimeToTzSpecificLocalTime (Address: 0x1801121f0)
  • TerminateProcess (Address: 0x1801121f8)
  • TlsAlloc (Address: 0x180112200)
  • TlsFree (Address: 0x180112208)
  • TlsGetValue (Address: 0x180112210)
  • TlsSetValue (Address: 0x180112218)
  • TryAcquireSRWLockExclusive (Address: 0x180112220)
  • UnhandledExceptionFilter (Address: 0x180112228)
  • UnlockFileEx (Address: 0x180112230)
  • UnmapViewOfFile (Address: 0x180112238)
  • UnregisterWaitEx (Address: 0x180112240)
  • VerifyVersionInfoW (Address: 0x180112250)
  • VerSetConditionMask (Address: 0x180112248)
  • VirtualAlloc (Address: 0x180112258)
  • VirtualFree (Address: 0x180112260)
  • VirtualProtect (Address: 0x180112268)
  • VirtualProtectEx (Address: 0x180112270)
  • VirtualQuery (Address: 0x180112278)
  • WaitForSingleObject (Address: 0x180112280)
  • WakeAllConditionVariable (Address: 0x180112288)
  • WakeConditionVariable (Address: 0x180112290)
  • WideCharToMultiByte (Address: 0x180112298)
  • WriteConsoleW (Address: 0x1801122a0)
  • WriteFile (Address: 0x1801122a8)
  • WriteProcessMemory (Address: 0x1801122b0)
ntdll.dll
  • NtClose (Address: 0x1801122c0)
  • NtCreateKey (Address: 0x1801122c8)
  • NtDeleteKey (Address: 0x1801122d0)
  • NtOpenKeyEx (Address: 0x1801122d8)
  • NtQueryValueKey (Address: 0x1801122e0)
  • NtSetValueKey (Address: 0x1801122e8)
  • RtlFormatCurrentUserKeyPath (Address: 0x1801122f0)
  • RtlFreeUnicodeString (Address: 0x1801122f8)
  • RtlInitUnicodeString (Address: 0x180112300)