DllExtractChromiumSecrets.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: e1dc2bc6540717c62a86a805264708e4
File Size: 36.5 KB
Uploaded At: April 10, 2026, 11:08 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
No exported functions.
Imported DLLs & Functions
api-ms-win-crt-runtime-l1-1-0.dll
- _cexit (Address: 0x180007278)
- _configure_narrow_argv (Address: 0x180007258)
- _execute_onexit_table (Address: 0x180007270)
- _initialize_narrow_environment (Address: 0x180007260)
- _initialize_onexit_table (Address: 0x180007268)
- _initterm (Address: 0x180007280)
- _initterm_e (Address: 0x180007288)
- _seh_filter_dll (Address: 0x180007250)
api-ms-win-crt-stdio-l1-1-0.dll
- __acrt_iob_func (Address: 0x1800072a0)
- __stdio_common_vfprintf (Address: 0x180007298)
- __stdio_common_vsprintf (Address: 0x1800072a8)
CRYPT32.dll
- CryptStringToBinaryA (Address: 0x180007000)
- CryptUnprotectData (Address: 0x180007008)
KERNEL32.dll
- CloseHandle (Address: 0x180007040)
- CopyFileA (Address: 0x180007108)
- CreateFileA (Address: 0x180007098)
- CreateThread (Address: 0x180007048)
- CreateToolhelp32Snapshot (Address: 0x1800070f0)
- DeleteFileA (Address: 0x180007118)
- DisableThreadLibraryCalls (Address: 0x180007030)
- DuplicateHandle (Address: 0x180007198)
- FlushFileBuffers (Address: 0x180007078)
- GetCurrentProcess (Address: 0x1800070b8)
- GetCurrentProcessId (Address: 0x180007068)
- GetCurrentThreadId (Address: 0x180007148)
- GetEnvironmentVariableA (Address: 0x1800070d0)
- GetFileAttributesA (Address: 0x180007110)
- GetFileInformationByHandleEx (Address: 0x1800070a8)
- GetFileSize (Address: 0x1800070a0)
- GetFileType (Address: 0x180007138)
- GetLastError (Address: 0x180007028)
- GetLocalTime (Address: 0x180007058)
- GetModuleFileNameA (Address: 0x1800071a0)
- GetModuleHandleA (Address: 0x1800070e0)
- GetProcAddress (Address: 0x180007130)
- GetProcessHeap (Address: 0x180007070)
- GetSystemTimeAsFileTime (Address: 0x180007178)
- GetTempFileNameA (Address: 0x180007140)
- GetTempPathA (Address: 0x180007100)
- GetVolumeInformationA (Address: 0x180007090)
- HeapAlloc (Address: 0x180007050)
- HeapFree (Address: 0x1800070d8)
- HeapReAlloc (Address: 0x180007128)
- InitializeSListHead (Address: 0x180007180)
- IsDebuggerPresent (Address: 0x180007168)
- IsProcessorFeaturePresent (Address: 0x180007150)
- LocalAlloc (Address: 0x180007020)
- LocalFree (Address: 0x180007060)
- lstrcpyA (Address: 0x180007038)
- lstrlenA (Address: 0x180007088)
- lstrlenW (Address: 0x1800070c0)
- MultiByteToWideChar (Address: 0x1800070f8)
- OpenProcess (Address: 0x1800070e8)
- OutputDebugStringA (Address: 0x180007018)
- Process32First (Address: 0x1800070b0)
- Process32Next (Address: 0x180007120)
- QueryPerformanceCounter (Address: 0x1800071b0)
- ReadFile (Address: 0x180007080)
- RtlCaptureContext (Address: 0x180007188)
- RtlLookupFunctionEntry (Address: 0x1800071a8)
- RtlVirtualUnwind (Address: 0x180007170)
- SetFilePointer (Address: 0x1800070c8)
- SetUnhandledExceptionFilter (Address: 0x180007158)
- UnhandledExceptionFilter (Address: 0x180007160)
- WriteFile (Address: 0x180007190)
ole32.dll
- CoCreateInstance (Address: 0x1800072c8)
- CoInitializeEx (Address: 0x1800072c0)
- CoSetProxyBlanket (Address: 0x1800072b8)
- CoUninitialize (Address: 0x1800072d0)
OLEAUT32.dll
- SysAllocStringByteLen (Address: 0x1800071c8)
- SysFreeString (Address: 0x1800071c0)
SHLWAPI.dll
- PathFindFileNameA (Address: 0x1800071e8)
- StrCmpNIA (Address: 0x1800071f0)
- StrCmpNIW (Address: 0x1800071f8)
- StrStrIA (Address: 0x1800071e0)
- StrStrIW (Address: 0x1800071d8)
USER32.dll
- wsprintfA (Address: 0x180007208)
VCRUNTIME140.dll
- __C_specific_handler (Address: 0x180007238)
- __std_type_info_destroy_list (Address: 0x180007228)
- memchr (Address: 0x180007230)
- memcmp (Address: 0x180007218)
- memcpy (Address: 0x180007240)
- memset (Address: 0x180007220)