chrome_elf.dll
Description: Chromium
Authors: Copyright 2024 The Chromium Authors. All rights reserved.
Version: 128.0.6613.138
Architecture: 64-bit
Operating System: Windows
SHA256: 68df7e4c4b78c05db7d4bb196c3c867d
File Size: 1.3 MB
Uploaded At: Dec. 1, 2025, 2:54 p.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread
Exported Functions
- ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xb5750)
- CrashForException_ExportThunk (Ordinal: 2, Address: 0xb56e0)
- DisableHook (Ordinal: 3, Address: 0xb4d10)
- DrainLog (Ordinal: 4, Address: 0x1a820)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xb5760)
- DumpProcessWithoutCrash (Ordinal: 6, Address: 0xb4ca0)
- GetApplyHookResult (Ordinal: 7, Address: 0x1a360)
- GetBlockedModulesCount (Ordinal: 8, Address: 0xb4ff0)
- GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xb5610)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xb5740)
- GetHandleVerifier (Ordinal: 11, Address: 0x46c00)
- GetInstallDetailsPayload (Ordinal: 12, Address: 0x1bd70)
- GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0xb5000)
- GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x19a90)
- InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0xb5710)
- IsBrowserProcess (Ordinal: 16, Address: 0x19bf0)
- IsCrashReportingEnabledImpl (Ordinal: 17, Address: 0x317a0)
- IsExtensionPointDisableSet (Ordinal: 18, Address: 0x19c00)
- IsThirdPartyInitialized (Ordinal: 19, Address: 0x1b6b0)
- RegisterLogNotification (Ordinal: 20, Address: 0x1b090)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 21, Address: 0xb55c0)
- SetCrashKeyValueImpl (Ordinal: 22, Address: 0x31530)
- SetMetricsClientId (Ordinal: 23, Address: 0x19be0)
- SetUploadConsent_ExportThunk (Ordinal: 24, Address: 0xb5700)
- SignalChromeElf (Ordinal: 25, Address: 0x19a80)
- SignalInitializeCrashReporting (Ordinal: 26, Address: 0x19a70)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x18010a268)
- AddVectoredExceptionHandler (Address: 0x18010a270)
- CloseHandle (Address: 0x18010a278)
- CompareStringW (Address: 0x18010a280)
- CreateDirectoryW (Address: 0x18010a288)
- CreateEventW (Address: 0x18010a290)
- CreateFileW (Address: 0x18010a298)
- CreateMutexW (Address: 0x18010a2a0)
- CreateNamedPipeW (Address: 0x18010a2a8)
- CreateProcessW (Address: 0x18010a2b0)
- CreateRemoteThread (Address: 0x18010a2b8)
- CreateThread (Address: 0x18010a2c0)
- DeleteCriticalSection (Address: 0x18010a2c8)
- DeleteFileW (Address: 0x18010a2d0)
- DuplicateHandle (Address: 0x18010a2d8)
- EncodePointer (Address: 0x18010a2e0)
- EnterCriticalSection (Address: 0x18010a2e8)
- EnumSystemLocalesW (Address: 0x18010a2f0)
- ExitProcess (Address: 0x18010a2f8)
- ExpandEnvironmentStringsW (Address: 0x18010a300)
- FileTimeToSystemTime (Address: 0x18010a308)
- FindClose (Address: 0x18010a310)
- FindFirstFileExW (Address: 0x18010a318)
- FindNextFileW (Address: 0x18010a320)
- FlsAlloc (Address: 0x18010a328)
- FlsFree (Address: 0x18010a330)
- FlsGetValue (Address: 0x18010a338)
- FlsSetValue (Address: 0x18010a340)
- FlushFileBuffers (Address: 0x18010a348)
- FormatMessageW (Address: 0x18010a350)
- FreeEnvironmentStringsW (Address: 0x18010a358)
- FreeLibrary (Address: 0x18010a360)
- GetACP (Address: 0x18010a368)
- GetCommandLineA (Address: 0x18010a378)
- GetCommandLineW (Address: 0x18010a380)
- GetComputerNameExW (Address: 0x18010a388)
- GetConsoleMode (Address: 0x18010a390)
- GetConsoleOutputCP (Address: 0x18010a398)
- GetCPInfo (Address: 0x18010a370)
- GetCurrentDirectoryW (Address: 0x18010a3a0)
- GetCurrentProcess (Address: 0x18010a3a8)
- GetCurrentProcessId (Address: 0x18010a3b0)
- GetCurrentThread (Address: 0x18010a3b8)
- GetCurrentThreadId (Address: 0x18010a3c0)
- GetDateFormatW (Address: 0x18010a3c8)
- GetDriveTypeW (Address: 0x18010a3d0)
- GetEnvironmentStringsW (Address: 0x18010a3d8)
- GetEnvironmentVariableW (Address: 0x18010a3e0)
- GetFileAttributesW (Address: 0x18010a3e8)
- GetFileInformationByHandle (Address: 0x18010a3f0)
- GetFileSizeEx (Address: 0x18010a3f8)
- GetFileTime (Address: 0x18010a400)
- GetFileType (Address: 0x18010a408)
- GetFullPathNameW (Address: 0x18010a410)
- GetLastError (Address: 0x18010a418)
- GetLocaleInfoW (Address: 0x18010a428)
- GetLocalTime (Address: 0x18010a420)
- GetLongPathNameW (Address: 0x18010a430)
- GetModuleFileNameW (Address: 0x18010a438)
- GetModuleHandleA (Address: 0x18010a440)
- GetModuleHandleExW (Address: 0x18010a448)
- GetModuleHandleW (Address: 0x18010a450)
- GetNativeSystemInfo (Address: 0x18010a458)
- GetOEMCP (Address: 0x18010a460)
- GetProcAddress (Address: 0x18010a468)
- GetProcessHeap (Address: 0x18010a470)
- GetProcessId (Address: 0x18010a478)
- GetProductInfo (Address: 0x18010a480)
- GetStartupInfoW (Address: 0x18010a488)
- GetStdHandle (Address: 0x18010a490)
- GetStringTypeW (Address: 0x18010a498)
- GetSystemDirectoryW (Address: 0x18010a4a0)
- GetSystemInfo (Address: 0x18010a4a8)
- GetSystemTimeAsFileTime (Address: 0x18010a4b0)
- GetTempPathW (Address: 0x18010a4b8)
- GetThreadPriority (Address: 0x18010a4c0)
- GetTickCount (Address: 0x18010a4c8)
- GetTimeFormatW (Address: 0x18010a4d0)
- GetTimeZoneInformation (Address: 0x18010a4d8)
- GetUserDefaultLCID (Address: 0x18010a4e0)
- GetVersionExW (Address: 0x18010a4e8)
- GetWindowsDirectoryW (Address: 0x18010a4f0)
- InitializeCriticalSection (Address: 0x18010a500)
- InitializeCriticalSectionAndSpinCount (Address: 0x18010a508)
- InitializeSListHead (Address: 0x18010a510)
- InitOnceExecuteOnce (Address: 0x18010a4f8)
- InterlockedFlushSList (Address: 0x18010a518)
- IsDebuggerPresent (Address: 0x18010a520)
- IsProcessorFeaturePresent (Address: 0x18010a528)
- IsValidCodePage (Address: 0x18010a530)
- IsValidLocale (Address: 0x18010a538)
- IsWow64Process (Address: 0x18010a540)
- K32GetMappedFileNameW (Address: 0x18010a548)
- LCMapStringW (Address: 0x18010a550)
- LeaveCriticalSection (Address: 0x18010a558)
- LoadLibraryExA (Address: 0x18010a560)
- LoadLibraryExW (Address: 0x18010a568)
- LoadLibraryW (Address: 0x18010a570)
- LocalFree (Address: 0x18010a578)
- LockFileEx (Address: 0x18010a580)
- lstrcmpiA (Address: 0x18010a7b0)
- MultiByteToWideChar (Address: 0x18010a588)
- OpenProcess (Address: 0x18010a590)
- OutputDebugStringA (Address: 0x18010a598)
- OutputDebugStringW (Address: 0x18010a5a0)
- PeekNamedPipe (Address: 0x18010a5a8)
- QueryPerformanceCounter (Address: 0x18010a5b0)
- QueryPerformanceFrequency (Address: 0x18010a5b8)
- QueryThreadCycleTime (Address: 0x18010a5c0)
- RaiseException (Address: 0x18010a5c8)
- ReadConsoleW (Address: 0x18010a5d0)
- ReadFile (Address: 0x18010a5d8)
- ReadProcessMemory (Address: 0x18010a5e0)
- ReleaseMutex (Address: 0x18010a5e8)
- ReleaseSRWLockExclusive (Address: 0x18010a5f0)
- RemoveDirectoryW (Address: 0x18010a5f8)
- RemoveVectoredExceptionHandler (Address: 0x18010a600)
- ResetEvent (Address: 0x18010a608)
- RtlCaptureContext (Address: 0x18010a610)
- RtlCaptureStackBackTrace (Address: 0x18010a618)
- RtlLookupFunctionEntry (Address: 0x18010a620)
- RtlPcToFileHeader (Address: 0x18010a628)
- RtlUnwind (Address: 0x18010a630)
- RtlUnwindEx (Address: 0x18010a638)
- RtlVirtualUnwind (Address: 0x18010a640)
- SetConsoleCtrlHandler (Address: 0x18010a648)
- SetEndOfFile (Address: 0x18010a650)
- SetEnvironmentVariableW (Address: 0x18010a658)
- SetEvent (Address: 0x18010a660)
- SetFilePointerEx (Address: 0x18010a668)
- SetLastError (Address: 0x18010a670)
- SetNamedPipeHandleState (Address: 0x18010a678)
- SetProcessMitigationPolicy (Address: 0x18010a680)
- SetStdHandle (Address: 0x18010a688)
- SetThreadInformation (Address: 0x18010a690)
- SetThreadPriority (Address: 0x18010a698)
- SetUnhandledExceptionFilter (Address: 0x18010a6a0)
- Sleep (Address: 0x18010a6a8)
- SleepConditionVariableSRW (Address: 0x18010a6b0)
- SleepEx (Address: 0x18010a6b8)
- SwitchToThread (Address: 0x18010a6c0)
- SystemTimeToTzSpecificLocalTime (Address: 0x18010a6c8)
- TerminateProcess (Address: 0x18010a6d0)
- TlsAlloc (Address: 0x18010a6d8)
- TlsFree (Address: 0x18010a6e0)
- TlsGetValue (Address: 0x18010a6e8)
- TlsSetValue (Address: 0x18010a6f0)
- TransactNamedPipe (Address: 0x18010a6f8)
- TryAcquireSRWLockExclusive (Address: 0x18010a700)
- UnhandledExceptionFilter (Address: 0x18010a708)
- UnlockFileEx (Address: 0x18010a710)
- UnmapViewOfFile (Address: 0x18010a718)
- UnregisterWaitEx (Address: 0x18010a720)
- VerifyVersionInfoW (Address: 0x18010a730)
- VerSetConditionMask (Address: 0x18010a728)
- VirtualAlloc (Address: 0x18010a738)
- VirtualFree (Address: 0x18010a740)
- VirtualProtect (Address: 0x18010a748)
- VirtualProtectEx (Address: 0x18010a750)
- VirtualQuery (Address: 0x18010a758)
- WaitForSingleObject (Address: 0x18010a760)
- WaitForSingleObjectEx (Address: 0x18010a768)
- WaitNamedPipeW (Address: 0x18010a770)
- WakeAllConditionVariable (Address: 0x18010a778)
- WakeConditionVariable (Address: 0x18010a780)
- WerRegisterRuntimeExceptionModule (Address: 0x18010a788)
- WideCharToMultiByte (Address: 0x18010a790)
- WriteConsoleW (Address: 0x18010a798)
- WriteFile (Address: 0x18010a7a0)
- WriteProcessMemory (Address: 0x18010a7a8)
ntdll.dll
- NtClose (Address: 0x18010a7c0)
- NtCreateKey (Address: 0x18010a7c8)
- NtDeleteKey (Address: 0x18010a7d0)
- NtOpenKeyEx (Address: 0x18010a7d8)
- NtQueryValueKey (Address: 0x18010a7e0)
- NtSetValueKey (Address: 0x18010a7e8)
- RtlFormatCurrentUserKeyPath (Address: 0x18010a7f0)
- RtlFreeUnicodeString (Address: 0x18010a7f8)
- RtlInitUnicodeString (Address: 0x18010a800)