chrome_elf.dll

Description: Chromium

Authors: Copyright 2024 The Chromium Authors. All rights reserved.

Version: 128.0.6613.138

Architecture: 64-bit

Operating System: Windows

SHA256: 68df7e4c4b78c05db7d4bb196c3c867d

File Size: 1.3 MB

Uploaded At: Dec. 1, 2025, 2:54 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread

Exported Functions

  • ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xb5750)
  • CrashForException_ExportThunk (Ordinal: 2, Address: 0xb56e0)
  • DisableHook (Ordinal: 3, Address: 0xb4d10)
  • DrainLog (Ordinal: 4, Address: 0x1a820)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xb5760)
  • DumpProcessWithoutCrash (Ordinal: 6, Address: 0xb4ca0)
  • GetApplyHookResult (Ordinal: 7, Address: 0x1a360)
  • GetBlockedModulesCount (Ordinal: 8, Address: 0xb4ff0)
  • GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xb5610)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xb5740)
  • GetHandleVerifier (Ordinal: 11, Address: 0x46c00)
  • GetInstallDetailsPayload (Ordinal: 12, Address: 0x1bd70)
  • GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0xb5000)
  • GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x19a90)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0xb5710)
  • IsBrowserProcess (Ordinal: 16, Address: 0x19bf0)
  • IsCrashReportingEnabledImpl (Ordinal: 17, Address: 0x317a0)
  • IsExtensionPointDisableSet (Ordinal: 18, Address: 0x19c00)
  • IsThirdPartyInitialized (Ordinal: 19, Address: 0x1b6b0)
  • RegisterLogNotification (Ordinal: 20, Address: 0x1b090)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 21, Address: 0xb55c0)
  • SetCrashKeyValueImpl (Ordinal: 22, Address: 0x31530)
  • SetMetricsClientId (Ordinal: 23, Address: 0x19be0)
  • SetUploadConsent_ExportThunk (Ordinal: 24, Address: 0xb5700)
  • SignalChromeElf (Ordinal: 25, Address: 0x19a80)
  • SignalInitializeCrashReporting (Ordinal: 26, Address: 0x19a70)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18010a268)
  • AddVectoredExceptionHandler (Address: 0x18010a270)
  • CloseHandle (Address: 0x18010a278)
  • CompareStringW (Address: 0x18010a280)
  • CreateDirectoryW (Address: 0x18010a288)
  • CreateEventW (Address: 0x18010a290)
  • CreateFileW (Address: 0x18010a298)
  • CreateMutexW (Address: 0x18010a2a0)
  • CreateNamedPipeW (Address: 0x18010a2a8)
  • CreateProcessW (Address: 0x18010a2b0)
  • CreateRemoteThread (Address: 0x18010a2b8)
  • CreateThread (Address: 0x18010a2c0)
  • DeleteCriticalSection (Address: 0x18010a2c8)
  • DeleteFileW (Address: 0x18010a2d0)
  • DuplicateHandle (Address: 0x18010a2d8)
  • EncodePointer (Address: 0x18010a2e0)
  • EnterCriticalSection (Address: 0x18010a2e8)
  • EnumSystemLocalesW (Address: 0x18010a2f0)
  • ExitProcess (Address: 0x18010a2f8)
  • ExpandEnvironmentStringsW (Address: 0x18010a300)
  • FileTimeToSystemTime (Address: 0x18010a308)
  • FindClose (Address: 0x18010a310)
  • FindFirstFileExW (Address: 0x18010a318)
  • FindNextFileW (Address: 0x18010a320)
  • FlsAlloc (Address: 0x18010a328)
  • FlsFree (Address: 0x18010a330)
  • FlsGetValue (Address: 0x18010a338)
  • FlsSetValue (Address: 0x18010a340)
  • FlushFileBuffers (Address: 0x18010a348)
  • FormatMessageW (Address: 0x18010a350)
  • FreeEnvironmentStringsW (Address: 0x18010a358)
  • FreeLibrary (Address: 0x18010a360)
  • GetACP (Address: 0x18010a368)
  • GetCommandLineA (Address: 0x18010a378)
  • GetCommandLineW (Address: 0x18010a380)
  • GetComputerNameExW (Address: 0x18010a388)
  • GetConsoleMode (Address: 0x18010a390)
  • GetConsoleOutputCP (Address: 0x18010a398)
  • GetCPInfo (Address: 0x18010a370)
  • GetCurrentDirectoryW (Address: 0x18010a3a0)
  • GetCurrentProcess (Address: 0x18010a3a8)
  • GetCurrentProcessId (Address: 0x18010a3b0)
  • GetCurrentThread (Address: 0x18010a3b8)
  • GetCurrentThreadId (Address: 0x18010a3c0)
  • GetDateFormatW (Address: 0x18010a3c8)
  • GetDriveTypeW (Address: 0x18010a3d0)
  • GetEnvironmentStringsW (Address: 0x18010a3d8)
  • GetEnvironmentVariableW (Address: 0x18010a3e0)
  • GetFileAttributesW (Address: 0x18010a3e8)
  • GetFileInformationByHandle (Address: 0x18010a3f0)
  • GetFileSizeEx (Address: 0x18010a3f8)
  • GetFileTime (Address: 0x18010a400)
  • GetFileType (Address: 0x18010a408)
  • GetFullPathNameW (Address: 0x18010a410)
  • GetLastError (Address: 0x18010a418)
  • GetLocaleInfoW (Address: 0x18010a428)
  • GetLocalTime (Address: 0x18010a420)
  • GetLongPathNameW (Address: 0x18010a430)
  • GetModuleFileNameW (Address: 0x18010a438)
  • GetModuleHandleA (Address: 0x18010a440)
  • GetModuleHandleExW (Address: 0x18010a448)
  • GetModuleHandleW (Address: 0x18010a450)
  • GetNativeSystemInfo (Address: 0x18010a458)
  • GetOEMCP (Address: 0x18010a460)
  • GetProcAddress (Address: 0x18010a468)
  • GetProcessHeap (Address: 0x18010a470)
  • GetProcessId (Address: 0x18010a478)
  • GetProductInfo (Address: 0x18010a480)
  • GetStartupInfoW (Address: 0x18010a488)
  • GetStdHandle (Address: 0x18010a490)
  • GetStringTypeW (Address: 0x18010a498)
  • GetSystemDirectoryW (Address: 0x18010a4a0)
  • GetSystemInfo (Address: 0x18010a4a8)
  • GetSystemTimeAsFileTime (Address: 0x18010a4b0)
  • GetTempPathW (Address: 0x18010a4b8)
  • GetThreadPriority (Address: 0x18010a4c0)
  • GetTickCount (Address: 0x18010a4c8)
  • GetTimeFormatW (Address: 0x18010a4d0)
  • GetTimeZoneInformation (Address: 0x18010a4d8)
  • GetUserDefaultLCID (Address: 0x18010a4e0)
  • GetVersionExW (Address: 0x18010a4e8)
  • GetWindowsDirectoryW (Address: 0x18010a4f0)
  • InitializeCriticalSection (Address: 0x18010a500)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18010a508)
  • InitializeSListHead (Address: 0x18010a510)
  • InitOnceExecuteOnce (Address: 0x18010a4f8)
  • InterlockedFlushSList (Address: 0x18010a518)
  • IsDebuggerPresent (Address: 0x18010a520)
  • IsProcessorFeaturePresent (Address: 0x18010a528)
  • IsValidCodePage (Address: 0x18010a530)
  • IsValidLocale (Address: 0x18010a538)
  • IsWow64Process (Address: 0x18010a540)
  • K32GetMappedFileNameW (Address: 0x18010a548)
  • LCMapStringW (Address: 0x18010a550)
  • LeaveCriticalSection (Address: 0x18010a558)
  • LoadLibraryExA (Address: 0x18010a560)
  • LoadLibraryExW (Address: 0x18010a568)
  • LoadLibraryW (Address: 0x18010a570)
  • LocalFree (Address: 0x18010a578)
  • LockFileEx (Address: 0x18010a580)
  • lstrcmpiA (Address: 0x18010a7b0)
  • MultiByteToWideChar (Address: 0x18010a588)
  • OpenProcess (Address: 0x18010a590)
  • OutputDebugStringA (Address: 0x18010a598)
  • OutputDebugStringW (Address: 0x18010a5a0)
  • PeekNamedPipe (Address: 0x18010a5a8)
  • QueryPerformanceCounter (Address: 0x18010a5b0)
  • QueryPerformanceFrequency (Address: 0x18010a5b8)
  • QueryThreadCycleTime (Address: 0x18010a5c0)
  • RaiseException (Address: 0x18010a5c8)
  • ReadConsoleW (Address: 0x18010a5d0)
  • ReadFile (Address: 0x18010a5d8)
  • ReadProcessMemory (Address: 0x18010a5e0)
  • ReleaseMutex (Address: 0x18010a5e8)
  • ReleaseSRWLockExclusive (Address: 0x18010a5f0)
  • RemoveDirectoryW (Address: 0x18010a5f8)
  • RemoveVectoredExceptionHandler (Address: 0x18010a600)
  • ResetEvent (Address: 0x18010a608)
  • RtlCaptureContext (Address: 0x18010a610)
  • RtlCaptureStackBackTrace (Address: 0x18010a618)
  • RtlLookupFunctionEntry (Address: 0x18010a620)
  • RtlPcToFileHeader (Address: 0x18010a628)
  • RtlUnwind (Address: 0x18010a630)
  • RtlUnwindEx (Address: 0x18010a638)
  • RtlVirtualUnwind (Address: 0x18010a640)
  • SetConsoleCtrlHandler (Address: 0x18010a648)
  • SetEndOfFile (Address: 0x18010a650)
  • SetEnvironmentVariableW (Address: 0x18010a658)
  • SetEvent (Address: 0x18010a660)
  • SetFilePointerEx (Address: 0x18010a668)
  • SetLastError (Address: 0x18010a670)
  • SetNamedPipeHandleState (Address: 0x18010a678)
  • SetProcessMitigationPolicy (Address: 0x18010a680)
  • SetStdHandle (Address: 0x18010a688)
  • SetThreadInformation (Address: 0x18010a690)
  • SetThreadPriority (Address: 0x18010a698)
  • SetUnhandledExceptionFilter (Address: 0x18010a6a0)
  • Sleep (Address: 0x18010a6a8)
  • SleepConditionVariableSRW (Address: 0x18010a6b0)
  • SleepEx (Address: 0x18010a6b8)
  • SwitchToThread (Address: 0x18010a6c0)
  • SystemTimeToTzSpecificLocalTime (Address: 0x18010a6c8)
  • TerminateProcess (Address: 0x18010a6d0)
  • TlsAlloc (Address: 0x18010a6d8)
  • TlsFree (Address: 0x18010a6e0)
  • TlsGetValue (Address: 0x18010a6e8)
  • TlsSetValue (Address: 0x18010a6f0)
  • TransactNamedPipe (Address: 0x18010a6f8)
  • TryAcquireSRWLockExclusive (Address: 0x18010a700)
  • UnhandledExceptionFilter (Address: 0x18010a708)
  • UnlockFileEx (Address: 0x18010a710)
  • UnmapViewOfFile (Address: 0x18010a718)
  • UnregisterWaitEx (Address: 0x18010a720)
  • VerifyVersionInfoW (Address: 0x18010a730)
  • VerSetConditionMask (Address: 0x18010a728)
  • VirtualAlloc (Address: 0x18010a738)
  • VirtualFree (Address: 0x18010a740)
  • VirtualProtect (Address: 0x18010a748)
  • VirtualProtectEx (Address: 0x18010a750)
  • VirtualQuery (Address: 0x18010a758)
  • WaitForSingleObject (Address: 0x18010a760)
  • WaitForSingleObjectEx (Address: 0x18010a768)
  • WaitNamedPipeW (Address: 0x18010a770)
  • WakeAllConditionVariable (Address: 0x18010a778)
  • WakeConditionVariable (Address: 0x18010a780)
  • WerRegisterRuntimeExceptionModule (Address: 0x18010a788)
  • WideCharToMultiByte (Address: 0x18010a790)
  • WriteConsoleW (Address: 0x18010a798)
  • WriteFile (Address: 0x18010a7a0)
  • WriteProcessMemory (Address: 0x18010a7a8)
ntdll.dll
  • NtClose (Address: 0x18010a7c0)
  • NtCreateKey (Address: 0x18010a7c8)
  • NtDeleteKey (Address: 0x18010a7d0)
  • NtOpenKeyEx (Address: 0x18010a7d8)
  • NtQueryValueKey (Address: 0x18010a7e0)
  • NtSetValueKey (Address: 0x18010a7e8)
  • RtlFormatCurrentUserKeyPath (Address: 0x18010a7f0)
  • RtlFreeUnicodeString (Address: 0x18010a7f8)
  • RtlInitUnicodeString (Address: 0x18010a800)