DllExtractChromiumSecrets.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: e1dc2bc6540717c62a86a805264708e4

File Size: 36.5 KB

Uploaded At: April 10, 2026, 11:08 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

No exported functions.

Imported DLLs & Functions

api-ms-win-crt-runtime-l1-1-0.dll
  • _cexit (Address: 0x180007278)
  • _configure_narrow_argv (Address: 0x180007258)
  • _execute_onexit_table (Address: 0x180007270)
  • _initialize_narrow_environment (Address: 0x180007260)
  • _initialize_onexit_table (Address: 0x180007268)
  • _initterm (Address: 0x180007280)
  • _initterm_e (Address: 0x180007288)
  • _seh_filter_dll (Address: 0x180007250)
api-ms-win-crt-stdio-l1-1-0.dll
  • __acrt_iob_func (Address: 0x1800072a0)
  • __stdio_common_vfprintf (Address: 0x180007298)
  • __stdio_common_vsprintf (Address: 0x1800072a8)
CRYPT32.dll
  • CryptStringToBinaryA (Address: 0x180007000)
  • CryptUnprotectData (Address: 0x180007008)
KERNEL32.dll
  • CloseHandle (Address: 0x180007040)
  • CopyFileA (Address: 0x180007108)
  • CreateFileA (Address: 0x180007098)
  • CreateThread (Address: 0x180007048)
  • CreateToolhelp32Snapshot (Address: 0x1800070f0)
  • DeleteFileA (Address: 0x180007118)
  • DisableThreadLibraryCalls (Address: 0x180007030)
  • DuplicateHandle (Address: 0x180007198)
  • FlushFileBuffers (Address: 0x180007078)
  • GetCurrentProcess (Address: 0x1800070b8)
  • GetCurrentProcessId (Address: 0x180007068)
  • GetCurrentThreadId (Address: 0x180007148)
  • GetEnvironmentVariableA (Address: 0x1800070d0)
  • GetFileAttributesA (Address: 0x180007110)
  • GetFileInformationByHandleEx (Address: 0x1800070a8)
  • GetFileSize (Address: 0x1800070a0)
  • GetFileType (Address: 0x180007138)
  • GetLastError (Address: 0x180007028)
  • GetLocalTime (Address: 0x180007058)
  • GetModuleFileNameA (Address: 0x1800071a0)
  • GetModuleHandleA (Address: 0x1800070e0)
  • GetProcAddress (Address: 0x180007130)
  • GetProcessHeap (Address: 0x180007070)
  • GetSystemTimeAsFileTime (Address: 0x180007178)
  • GetTempFileNameA (Address: 0x180007140)
  • GetTempPathA (Address: 0x180007100)
  • GetVolumeInformationA (Address: 0x180007090)
  • HeapAlloc (Address: 0x180007050)
  • HeapFree (Address: 0x1800070d8)
  • HeapReAlloc (Address: 0x180007128)
  • InitializeSListHead (Address: 0x180007180)
  • IsDebuggerPresent (Address: 0x180007168)
  • IsProcessorFeaturePresent (Address: 0x180007150)
  • LocalAlloc (Address: 0x180007020)
  • LocalFree (Address: 0x180007060)
  • lstrcpyA (Address: 0x180007038)
  • lstrlenA (Address: 0x180007088)
  • lstrlenW (Address: 0x1800070c0)
  • MultiByteToWideChar (Address: 0x1800070f8)
  • OpenProcess (Address: 0x1800070e8)
  • OutputDebugStringA (Address: 0x180007018)
  • Process32First (Address: 0x1800070b0)
  • Process32Next (Address: 0x180007120)
  • QueryPerformanceCounter (Address: 0x1800071b0)
  • ReadFile (Address: 0x180007080)
  • RtlCaptureContext (Address: 0x180007188)
  • RtlLookupFunctionEntry (Address: 0x1800071a8)
  • RtlVirtualUnwind (Address: 0x180007170)
  • SetFilePointer (Address: 0x1800070c8)
  • SetUnhandledExceptionFilter (Address: 0x180007158)
  • UnhandledExceptionFilter (Address: 0x180007160)
  • WriteFile (Address: 0x180007190)
ole32.dll
  • CoCreateInstance (Address: 0x1800072c8)
  • CoInitializeEx (Address: 0x1800072c0)
  • CoSetProxyBlanket (Address: 0x1800072b8)
  • CoUninitialize (Address: 0x1800072d0)
OLEAUT32.dll
  • SysAllocStringByteLen (Address: 0x1800071c8)
  • SysFreeString (Address: 0x1800071c0)
SHLWAPI.dll
  • PathFindFileNameA (Address: 0x1800071e8)
  • StrCmpNIA (Address: 0x1800071f0)
  • StrCmpNIW (Address: 0x1800071f8)
  • StrStrIA (Address: 0x1800071e0)
  • StrStrIW (Address: 0x1800071d8)
USER32.dll
  • wsprintfA (Address: 0x180007208)
VCRUNTIME140.dll
  • __C_specific_handler (Address: 0x180007238)
  • __std_type_info_destroy_list (Address: 0x180007228)
  • memchr (Address: 0x180007230)
  • memcmp (Address: 0x180007218)
  • memcpy (Address: 0x180007240)
  • memset (Address: 0x180007220)