chrome_elf.dll
Description: Google Chrome
Authors: Copyright 2025 Google LLC. All rights reserved.
Version: 142.0.7444.176
Architecture: 64-bit
Operating System: Windows
SHA256: 06cd9e571db0128b5b8f7991f6ed4390
File Size: 1.6 MB
Uploaded At: Dec. 1, 2025, 2:50 p.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread
Exported Functions
- ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0x109080)
- CrashForException_ExportThunk (Ordinal: 2, Address: 0x108fb0)
- DisableHook (Ordinal: 3, Address: 0x107e20)
- DrainLog (Ordinal: 4, Address: 0x1080d0)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0x109090)
- DumpProcessWithoutCrash (Ordinal: 6, Address: 0x107da0)
- GetApplyHookResult (Ordinal: 7, Address: 0x1f230)
- GetBlockedModulesCount (Ordinal: 8, Address: 0x108880)
- GetCrashReports_ExportThunk (Ordinal: 9, Address: 0x108ed0)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0x109070)
- GetHandleVerifier (Ordinal: 11, Address: 0x33ed0)
- GetInstallDetailsPayload (Ordinal: 12, Address: 0x20070)
- GetProductInfo_ExportThunk (Ordinal: 13, Address: 0x109010)
- GetUniqueBlockedModulesCount (Ordinal: 14, Address: 0x108890)
- GetUploadConsent_ExportThunk (Ordinal: 15, Address: 0x108fe0)
- GetUserDataDirectoryThunk (Ordinal: 16, Address: 0x1eb60)
- InjectDumpForHungInput_ExportThunk (Ordinal: 17, Address: 0x109040)
- IsBrowserProcess (Ordinal: 18, Address: 0x1ecc0)
- IsExtensionPointDisableSet (Ordinal: 19, Address: 0x1ecd0)
- IsTemporaryUserDataDirectoryCreatedForHeadless (Ordinal: 20, Address: 0x107d80)
- IsThirdPartyInitialized (Ordinal: 21, Address: 0x1fa60)
- RegisterLogNotification (Ordinal: 22, Address: 0x1087c0)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 23, Address: 0x108e60)
- SetMetricsClientId (Ordinal: 24, Address: 0x107db0)
- SetUploadConsent_ExportThunk (Ordinal: 25, Address: 0x108fd0)
- SignalChromeElf (Ordinal: 26, Address: 0x1eb50)
- SignalInitializeCrashReporting (Ordinal: 27, Address: 0x1eb40)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180178e48)
- AddVectoredExceptionHandler (Address: 0x180178e50)
- CloseHandle (Address: 0x180178e58)
- CompareStringW (Address: 0x180178e60)
- CreateDirectoryW (Address: 0x180178e68)
- CreateEventW (Address: 0x180178e70)
- CreateFileW (Address: 0x180178e78)
- CreateMutexW (Address: 0x180178e80)
- CreateNamedPipeW (Address: 0x180178e88)
- CreateProcessW (Address: 0x180178e90)
- CreateRemoteThread (Address: 0x180178e98)
- CreateThread (Address: 0x180178ea0)
- DeleteCriticalSection (Address: 0x180178ea8)
- DeleteFileW (Address: 0x180178eb0)
- DuplicateHandle (Address: 0x180178eb8)
- EncodePointer (Address: 0x180178ec0)
- EnterCriticalSection (Address: 0x180178ec8)
- EnumSystemLocalesW (Address: 0x180178ed0)
- ExitProcess (Address: 0x180178ed8)
- ExpandEnvironmentStringsW (Address: 0x180178ee0)
- FileTimeToSystemTime (Address: 0x180178ee8)
- FindClose (Address: 0x180178ef0)
- FindFirstFileExW (Address: 0x180178ef8)
- FindNextFileW (Address: 0x180178f00)
- FlsAlloc (Address: 0x180178f08)
- FlsFree (Address: 0x180178f10)
- FlsGetValue (Address: 0x180178f18)
- FlsSetValue (Address: 0x180178f20)
- FlushFileBuffers (Address: 0x180178f28)
- FormatMessageW (Address: 0x180178f30)
- FreeEnvironmentStringsW (Address: 0x180178f38)
- FreeLibrary (Address: 0x180178f40)
- GetACP (Address: 0x180178f48)
- GetCommandLineA (Address: 0x180178f58)
- GetCommandLineW (Address: 0x180178f60)
- GetComputerNameExW (Address: 0x180178f68)
- GetConsoleMode (Address: 0x180178f70)
- GetConsoleOutputCP (Address: 0x180178f78)
- GetCPInfo (Address: 0x180178f50)
- GetCurrentDirectoryW (Address: 0x180178f80)
- GetCurrentProcess (Address: 0x180178f88)
- GetCurrentProcessId (Address: 0x180178f90)
- GetCurrentThread (Address: 0x180178f98)
- GetCurrentThreadId (Address: 0x180178fa0)
- GetDateFormatW (Address: 0x180178fa8)
- GetDriveTypeW (Address: 0x180178fb0)
- GetEnvironmentStringsW (Address: 0x180178fb8)
- GetEnvironmentVariableW (Address: 0x180178fc0)
- GetFileAttributesW (Address: 0x180178fc8)
- GetFileInformationByHandle (Address: 0x180178fd0)
- GetFileSizeEx (Address: 0x180178fd8)
- GetFileTime (Address: 0x180178fe0)
- GetFileType (Address: 0x180178fe8)
- GetFullPathNameW (Address: 0x180178ff0)
- GetLastError (Address: 0x180178ff8)
- GetLocaleInfoW (Address: 0x180179008)
- GetLocalTime (Address: 0x180179000)
- GetLongPathNameW (Address: 0x180179010)
- GetModuleFileNameW (Address: 0x180179018)
- GetModuleHandleA (Address: 0x180179020)
- GetModuleHandleExW (Address: 0x180179028)
- GetModuleHandleW (Address: 0x180179030)
- GetNativeSystemInfo (Address: 0x180179038)
- GetOEMCP (Address: 0x180179040)
- GetProcAddress (Address: 0x180179048)
- GetProcessHeap (Address: 0x180179050)
- GetProcessId (Address: 0x180179058)
- GetProductInfo (Address: 0x180179060)
- GetStartupInfoW (Address: 0x180179068)
- GetStdHandle (Address: 0x180179070)
- GetStringTypeW (Address: 0x180179078)
- GetSystemDirectoryW (Address: 0x180179080)
- GetSystemInfo (Address: 0x180179088)
- GetSystemTimeAsFileTime (Address: 0x180179090)
- GetTempPathW (Address: 0x180179098)
- GetThreadId (Address: 0x1801790a0)
- GetThreadPriority (Address: 0x1801790a8)
- GetTickCount (Address: 0x1801790b0)
- GetTimeFormatW (Address: 0x1801790b8)
- GetTimeZoneInformation (Address: 0x1801790c0)
- GetUserDefaultLangID (Address: 0x1801790d0)
- GetUserDefaultLCID (Address: 0x1801790c8)
- GetVersionExW (Address: 0x1801790d8)
- GetWindowsDirectoryW (Address: 0x1801790e0)
- GlobalMemoryStatusEx (Address: 0x1801790e8)
- InitializeCriticalSection (Address: 0x1801790f8)
- InitializeCriticalSectionAndSpinCount (Address: 0x180179100)
- InitializeCriticalSectionEx (Address: 0x180179108)
- InitializeSListHead (Address: 0x180179110)
- InitOnceExecuteOnce (Address: 0x1801790f0)
- InterlockedFlushSList (Address: 0x180179118)
- IsDebuggerPresent (Address: 0x180179120)
- IsProcessorFeaturePresent (Address: 0x180179128)
- IsValidCodePage (Address: 0x180179130)
- IsValidLocale (Address: 0x180179138)
- IsWow64Process (Address: 0x180179140)
- K32GetMappedFileNameW (Address: 0x180179148)
- K32GetModuleInformation (Address: 0x180179150)
- LCMapStringW (Address: 0x180179158)
- LeaveCriticalSection (Address: 0x180179160)
- LoadLibraryExA (Address: 0x180179168)
- LoadLibraryExW (Address: 0x180179170)
- LoadLibraryW (Address: 0x180179178)
- LocalFree (Address: 0x180179180)
- LockFileEx (Address: 0x180179188)
- lstrcmpiA (Address: 0x1801793a8)
- lstrcmpiW (Address: 0x1801793b0)
- MultiByteToWideChar (Address: 0x180179190)
- OpenProcess (Address: 0x180179198)
- OutputDebugStringA (Address: 0x1801791a0)
- OutputDebugStringW (Address: 0x1801791a8)
- PeekNamedPipe (Address: 0x1801791b0)
- QueryPerformanceCounter (Address: 0x1801791b8)
- QueryPerformanceFrequency (Address: 0x1801791c0)
- QueryThreadCycleTime (Address: 0x1801791c8)
- RaiseException (Address: 0x1801791d0)
- ReadConsoleW (Address: 0x1801791d8)
- ReadFile (Address: 0x1801791e0)
- ReadProcessMemory (Address: 0x1801791e8)
- ReleaseMutex (Address: 0x1801791f0)
- ReleaseSRWLockExclusive (Address: 0x1801791f8)
- RemoveDirectoryW (Address: 0x180179200)
- RemoveVectoredExceptionHandler (Address: 0x180179208)
- RtlCaptureContext (Address: 0x180179210)
- RtlCaptureStackBackTrace (Address: 0x180179218)
- RtlLookupFunctionEntry (Address: 0x180179220)
- RtlPcToFileHeader (Address: 0x180179228)
- RtlUnwind (Address: 0x180179230)
- RtlUnwindEx (Address: 0x180179238)
- RtlVirtualUnwind (Address: 0x180179240)
- SetConsoleCtrlHandler (Address: 0x180179248)
- SetEndOfFile (Address: 0x180179250)
- SetEnvironmentVariableW (Address: 0x180179258)
- SetEvent (Address: 0x180179260)
- SetFilePointerEx (Address: 0x180179268)
- SetLastError (Address: 0x180179270)
- SetNamedPipeHandleState (Address: 0x180179278)
- SetProcessMitigationPolicy (Address: 0x180179280)
- SetStdHandle (Address: 0x180179288)
- SetThreadInformation (Address: 0x180179290)
- SetThreadPriority (Address: 0x180179298)
- SetUnhandledExceptionFilter (Address: 0x1801792a0)
- Sleep (Address: 0x1801792a8)
- SleepConditionVariableSRW (Address: 0x1801792b0)
- SleepEx (Address: 0x1801792b8)
- SwitchToThread (Address: 0x1801792c0)
- SystemTimeToTzSpecificLocalTime (Address: 0x1801792c8)
- TerminateProcess (Address: 0x1801792d0)
- TlsAlloc (Address: 0x1801792d8)
- TlsFree (Address: 0x1801792e0)
- TlsGetValue (Address: 0x1801792e8)
- TlsSetValue (Address: 0x1801792f0)
- TransactNamedPipe (Address: 0x1801792f8)
- TryAcquireSRWLockExclusive (Address: 0x180179300)
- UnhandledExceptionFilter (Address: 0x180179308)
- UnlockFileEx (Address: 0x180179310)
- UnmapViewOfFile (Address: 0x180179318)
- UnregisterWaitEx (Address: 0x180179320)
- VerifyVersionInfoW (Address: 0x180179330)
- VerSetConditionMask (Address: 0x180179328)
- VirtualAlloc (Address: 0x180179338)
- VirtualFree (Address: 0x180179340)
- VirtualProtect (Address: 0x180179348)
- VirtualProtectEx (Address: 0x180179350)
- VirtualQuery (Address: 0x180179358)
- WaitForSingleObject (Address: 0x180179360)
- WaitNamedPipeW (Address: 0x180179368)
- WakeAllConditionVariable (Address: 0x180179370)
- WakeConditionVariable (Address: 0x180179378)
- WerRegisterRuntimeExceptionModule (Address: 0x180179380)
- WideCharToMultiByte (Address: 0x180179388)
- WriteConsoleW (Address: 0x180179390)
- WriteFile (Address: 0x180179398)
- WriteProcessMemory (Address: 0x1801793a0)
ntdll.dll
- NtClose (Address: 0x1801793c0)
- NtCreateKey (Address: 0x1801793c8)
- NtDeleteKey (Address: 0x1801793d0)
- NtOpenKeyEx (Address: 0x1801793d8)
- NtQueryValueKey (Address: 0x1801793e0)
- NtSetValueKey (Address: 0x1801793e8)
- RtlFormatCurrentUserKeyPath (Address: 0x1801793f0)
- RtlFreeUnicodeString (Address: 0x1801793f8)
- RtlInitUnicodeString (Address: 0x180179400)
VERSION.dll
- GetFileVersionInfoSizeW (Address: 0x180179410)
- GetFileVersionInfoW (Address: 0x180179418)
- VerQueryValueW (Address: 0x180179420)