chrome_elf.dll

Description: Chromium

Authors: Copyright 2022 The Chromium Authors. All rights reserved.

Version: 104.0.5112.102

Architecture: 32-bit

Operating System: Windows

SHA256: be99a4bfe6464828efbc456172d7bd1f

File Size: 991.6 KB

Uploaded At: Dec. 1, 2025, 2:48 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread

Exported Functions

  • ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0x3b20)
  • CrashForException_ExportThunk (Ordinal: 2, Address: 0x3ac0)
  • DisableHook (Ordinal: 3, Address: 0x1f50)
  • DrainLog (Ordinal: 4, Address: 0x26f0)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0x3b30)
  • DumpProcessWithoutCrash (Ordinal: 6, Address: 0x11b0)
  • GetApplyHookResult (Ordinal: 7, Address: 0x1f60)
  • GetBlockedModulesCount (Ordinal: 8, Address: 0x2f00)
  • GetCrashReports_ExportThunk (Ordinal: 9, Address: 0x3a20)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0x3b10)
  • GetHandleVerifier (Ordinal: 11, Address: 0x5c280)
  • GetInstallDetailsPayload (Ordinal: 12, Address: 0x3950)
  • GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0x2f10)
  • GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x1020)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0x3af0)
  • IsBrowserProcess (Ordinal: 16, Address: 0x11d0)
  • IsCrashReportingEnabledImpl (Ordinal: 17, Address: 0x3fd10)
  • IsThirdPartyInitialized (Ordinal: 18, Address: 0x3360)
  • RegisterLogNotification (Ordinal: 19, Address: 0x2e80)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 20, Address: 0x3960)
  • SetCrashKeyValueImpl (Ordinal: 21, Address: 0x3fbe0)
  • SetMetricsClientId (Ordinal: 22, Address: 0x11c0)
  • SetUploadConsent_ExportThunk (Ordinal: 23, Address: 0x3ae0)
  • SignalChromeElf (Ordinal: 24, Address: 0x1010)
  • SignalInitializeCrashReporting (Ordinal: 25, Address: 0x1000)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1cee374)
  • CloseHandle (Address: 0x1cee378)
  • CompareStringW (Address: 0x1cee37c)
  • CreateDirectoryW (Address: 0x1cee380)
  • CreateEventW (Address: 0x1cee384)
  • CreateFileW (Address: 0x1cee388)
  • CreateMutexW (Address: 0x1cee38c)
  • CreateNamedPipeW (Address: 0x1cee390)
  • CreateProcessW (Address: 0x1cee394)
  • CreateRemoteThread (Address: 0x1cee398)
  • CreateThread (Address: 0x1cee39c)
  • DecodePointer (Address: 0x1cee3a0)
  • DeleteCriticalSection (Address: 0x1cee3a4)
  • DeleteFileW (Address: 0x1cee3a8)
  • DuplicateHandle (Address: 0x1cee3ac)
  • EncodePointer (Address: 0x1cee3b0)
  • EnterCriticalSection (Address: 0x1cee3b4)
  • EnumSystemLocalesW (Address: 0x1cee3b8)
  • ExitProcess (Address: 0x1cee3bc)
  • ExitThread (Address: 0x1cee3c0)
  • ExpandEnvironmentStringsW (Address: 0x1cee3c4)
  • FileTimeToSystemTime (Address: 0x1cee3c8)
  • FindClose (Address: 0x1cee3cc)
  • FindFirstFileExW (Address: 0x1cee3d0)
  • FindNextFileW (Address: 0x1cee3d4)
  • FlsAlloc (Address: 0x1cee3d8)
  • FlsSetValue (Address: 0x1cee3dc)
  • FlushFileBuffers (Address: 0x1cee3e0)
  • FormatMessageA (Address: 0x1cee3e4)
  • FreeEnvironmentStringsW (Address: 0x1cee3e8)
  • FreeLibrary (Address: 0x1cee3ec)
  • FreeLibraryAndExitThread (Address: 0x1cee3f0)
  • GetACP (Address: 0x1cee3f4)
  • GetCommandLineA (Address: 0x1cee3fc)
  • GetCommandLineW (Address: 0x1cee400)
  • GetComputerNameExW (Address: 0x1cee404)
  • GetConsoleMode (Address: 0x1cee408)
  • GetConsoleOutputCP (Address: 0x1cee40c)
  • GetCPInfo (Address: 0x1cee3f8)
  • GetCurrentDirectoryW (Address: 0x1cee410)
  • GetCurrentProcess (Address: 0x1cee414)
  • GetCurrentProcessId (Address: 0x1cee418)
  • GetCurrentThread (Address: 0x1cee41c)
  • GetCurrentThreadId (Address: 0x1cee420)
  • GetDateFormatW (Address: 0x1cee424)
  • GetDriveTypeW (Address: 0x1cee428)
  • GetEnvironmentStringsW (Address: 0x1cee42c)
  • GetEnvironmentVariableW (Address: 0x1cee430)
  • GetFileAttributesW (Address: 0x1cee434)
  • GetFileInformationByHandle (Address: 0x1cee438)
  • GetFileSizeEx (Address: 0x1cee43c)
  • GetFileTime (Address: 0x1cee440)
  • GetFileType (Address: 0x1cee444)
  • GetFullPathNameW (Address: 0x1cee448)
  • GetLastError (Address: 0x1cee44c)
  • GetLocaleInfoW (Address: 0x1cee454)
  • GetLocalTime (Address: 0x1cee450)
  • GetLogicalProcessorInformation (Address: 0x1cee458)
  • GetLongPathNameW (Address: 0x1cee45c)
  • GetModuleFileNameW (Address: 0x1cee460)
  • GetModuleHandleA (Address: 0x1cee464)
  • GetModuleHandleExW (Address: 0x1cee468)
  • GetModuleHandleW (Address: 0x1cee46c)
  • GetNativeSystemInfo (Address: 0x1cee470)
  • GetOEMCP (Address: 0x1cee474)
  • GetProcAddress (Address: 0x1cee478)
  • GetProcessHeap (Address: 0x1cee47c)
  • GetProcessId (Address: 0x1cee480)
  • GetProductInfo (Address: 0x1cee484)
  • GetStartupInfoW (Address: 0x1cee488)
  • GetStdHandle (Address: 0x1cee48c)
  • GetStringTypeW (Address: 0x1cee490)
  • GetSystemInfo (Address: 0x1cee494)
  • GetSystemTimeAsFileTime (Address: 0x1cee498)
  • GetTempPathW (Address: 0x1cee49c)
  • GetThreadId (Address: 0x1cee4a0)
  • GetThreadPriority (Address: 0x1cee4a4)
  • GetTickCount (Address: 0x1cee4a8)
  • GetTimeFormatW (Address: 0x1cee4ac)
  • GetTimeZoneInformation (Address: 0x1cee4b0)
  • GetUserDefaultLCID (Address: 0x1cee4b4)
  • GetVersionExW (Address: 0x1cee4b8)
  • InitializeCriticalSection (Address: 0x1cee4c0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1cee4c4)
  • InitializeSListHead (Address: 0x1cee4c8)
  • InitOnceExecuteOnce (Address: 0x1cee4bc)
  • InterlockedFlushSList (Address: 0x1cee4cc)
  • IsDebuggerPresent (Address: 0x1cee4d0)
  • IsProcessorFeaturePresent (Address: 0x1cee4d4)
  • IsValidCodePage (Address: 0x1cee4d8)
  • IsValidLocale (Address: 0x1cee4dc)
  • IsWow64Process (Address: 0x1cee4e0)
  • LCMapStringW (Address: 0x1cee4e4)
  • LeaveCriticalSection (Address: 0x1cee4e8)
  • LoadLibraryExA (Address: 0x1cee4ec)
  • LoadLibraryExW (Address: 0x1cee4f0)
  • LoadLibraryW (Address: 0x1cee4f4)
  • LocalFree (Address: 0x1cee4f8)
  • LockFileEx (Address: 0x1cee4fc)
  • lstrcmpiA (Address: 0x1cee5e4)
  • MultiByteToWideChar (Address: 0x1cee500)
  • OpenProcess (Address: 0x1cee504)
  • OutputDebugStringA (Address: 0x1cee508)
  • OutputDebugStringW (Address: 0x1cee50c)
  • PeekNamedPipe (Address: 0x1cee510)
  • QueryPerformanceCounter (Address: 0x1cee514)
  • QueryPerformanceFrequency (Address: 0x1cee518)
  • QueryThreadCycleTime (Address: 0x1cee51c)
  • RaiseException (Address: 0x1cee520)
  • ReadConsoleW (Address: 0x1cee524)
  • ReadFile (Address: 0x1cee528)
  • ReadProcessMemory (Address: 0x1cee52c)
  • ReleaseMutex (Address: 0x1cee530)
  • ReleaseSRWLockExclusive (Address: 0x1cee534)
  • RemoveDirectoryW (Address: 0x1cee538)
  • ResetEvent (Address: 0x1cee53c)
  • RtlCaptureStackBackTrace (Address: 0x1cee540)
  • RtlUnwind (Address: 0x1cee544)
  • SetConsoleCtrlHandler (Address: 0x1cee548)
  • SetEndOfFile (Address: 0x1cee54c)
  • SetEnvironmentVariableW (Address: 0x1cee550)
  • SetEvent (Address: 0x1cee554)
  • SetFilePointerEx (Address: 0x1cee558)
  • SetLastError (Address: 0x1cee55c)
  • SetNamedPipeHandleState (Address: 0x1cee560)
  • SetStdHandle (Address: 0x1cee564)
  • SetThreadPriority (Address: 0x1cee568)
  • SetUnhandledExceptionFilter (Address: 0x1cee56c)
  • Sleep (Address: 0x1cee570)
  • SleepConditionVariableSRW (Address: 0x1cee574)
  • SleepEx (Address: 0x1cee578)
  • SystemTimeToTzSpecificLocalTime (Address: 0x1cee57c)
  • TerminateProcess (Address: 0x1cee580)
  • TlsAlloc (Address: 0x1cee584)
  • TlsFree (Address: 0x1cee588)
  • TlsGetValue (Address: 0x1cee58c)
  • TlsSetValue (Address: 0x1cee590)
  • TransactNamedPipe (Address: 0x1cee594)
  • TryAcquireSRWLockExclusive (Address: 0x1cee598)
  • UnhandledExceptionFilter (Address: 0x1cee59c)
  • UnlockFileEx (Address: 0x1cee5a0)
  • VerifyVersionInfoW (Address: 0x1cee5a8)
  • VerSetConditionMask (Address: 0x1cee5a4)
  • VirtualAlloc (Address: 0x1cee5ac)
  • VirtualFree (Address: 0x1cee5b0)
  • VirtualProtect (Address: 0x1cee5b4)
  • VirtualProtectEx (Address: 0x1cee5b8)
  • VirtualQuery (Address: 0x1cee5bc)
  • WaitForSingleObject (Address: 0x1cee5c0)
  • WaitForSingleObjectEx (Address: 0x1cee5c4)
  • WaitNamedPipeW (Address: 0x1cee5c8)
  • WakeAllConditionVariable (Address: 0x1cee5cc)
  • WakeConditionVariable (Address: 0x1cee5d0)
  • WideCharToMultiByte (Address: 0x1cee5d4)
  • WriteConsoleW (Address: 0x1cee5d8)
  • WriteFile (Address: 0x1cee5dc)
  • WriteProcessMemory (Address: 0x1cee5e0)