chrome_elf.dll
Description: Chromium
Authors: Copyright 2025 The Chromium Authors. All rights reserved.
Version: 133.0.6943.142
Architecture: 64-bit
Operating System: Windows
SHA256: 274466188b381de520ef14aa359d0f9f
File Size: 1.3 MB
Uploaded At: Dec. 2, 2025, 2:42 p.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread
Exported Functions
- ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xbd3a0)
- CrashForException_ExportThunk (Ordinal: 2, Address: 0xbd2d0)
- DisableHook (Ordinal: 3, Address: 0xbc870)
- DrainLog (Ordinal: 4, Address: 0x17590)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xbd3b0)
- DumpProcessWithoutCrash (Ordinal: 6, Address: 0xbc850)
- GetApplyHookResult (Ordinal: 7, Address: 0x2d9d0)
- GetBlockedModulesCount (Ordinal: 8, Address: 0xbcbb0)
- GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xbd1f0)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xbd390)
- GetHandleVerifier (Ordinal: 11, Address: 0x35d50)
- GetInstallDetailsPayload (Ordinal: 12, Address: 0x18610)
- GetProductInfo_ExportThunk (Ordinal: 13, Address: 0xbd330)
- GetUniqueBlockedModulesCount (Ordinal: 14, Address: 0xbcbc0)
- GetUploadConsent_ExportThunk (Ordinal: 15, Address: 0xbd300)
- GetUserDataDirectoryThunk (Ordinal: 16, Address: 0xe050)
- InjectDumpForHungInput_ExportThunk (Ordinal: 17, Address: 0xbd360)
- IsBrowserProcess (Ordinal: 18, Address: 0x12310)
- IsCrashReportingEnabledImpl (Ordinal: 19, Address: 0x2fd40)
- IsExtensionPointDisableSet (Ordinal: 20, Address: 0x1bd40)
- IsTemporaryUserDataDirectoryCreatedForHeadless (Ordinal: 21, Address: 0xbc830)
- IsThirdPartyInitialized (Ordinal: 22, Address: 0x2daa0)
- RegisterLogNotification (Ordinal: 23, Address: 0x2d9e0)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 24, Address: 0xbd190)
- SetCrashKeyValueImpl (Ordinal: 25, Address: 0x2fad0)
- SetMetricsClientId (Ordinal: 26, Address: 0xbc860)
- SetUploadConsent_ExportThunk (Ordinal: 27, Address: 0xbd2f0)
- SignalChromeElf (Ordinal: 28, Address: 0x29560)
- SignalInitializeCrashReporting (Ordinal: 29, Address: 0x27ac0)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180115f18)
- AddVectoredExceptionHandler (Address: 0x180115f20)
- CloseHandle (Address: 0x180115f28)
- CompareStringW (Address: 0x180115f30)
- CreateDirectoryW (Address: 0x180115f38)
- CreateEventW (Address: 0x180115f40)
- CreateFileW (Address: 0x180115f48)
- CreateMutexW (Address: 0x180115f50)
- CreateNamedPipeW (Address: 0x180115f58)
- CreateProcessW (Address: 0x180115f60)
- CreateRemoteThread (Address: 0x180115f68)
- CreateThread (Address: 0x180115f70)
- DeleteCriticalSection (Address: 0x180115f78)
- DeleteFileW (Address: 0x180115f80)
- DuplicateHandle (Address: 0x180115f88)
- EncodePointer (Address: 0x180115f90)
- EnterCriticalSection (Address: 0x180115f98)
- EnumSystemLocalesW (Address: 0x180115fa0)
- ExitProcess (Address: 0x180115fa8)
- ExpandEnvironmentStringsW (Address: 0x180115fb0)
- FileTimeToSystemTime (Address: 0x180115fb8)
- FindClose (Address: 0x180115fc0)
- FindFirstFileExW (Address: 0x180115fc8)
- FindNextFileW (Address: 0x180115fd0)
- FlsAlloc (Address: 0x180115fd8)
- FlsFree (Address: 0x180115fe0)
- FlsGetValue (Address: 0x180115fe8)
- FlsSetValue (Address: 0x180115ff0)
- FlushFileBuffers (Address: 0x180115ff8)
- FormatMessageW (Address: 0x180116000)
- FreeEnvironmentStringsW (Address: 0x180116008)
- FreeLibrary (Address: 0x180116010)
- GetACP (Address: 0x180116018)
- GetCommandLineA (Address: 0x180116028)
- GetCommandLineW (Address: 0x180116030)
- GetComputerNameExW (Address: 0x180116038)
- GetConsoleMode (Address: 0x180116040)
- GetConsoleOutputCP (Address: 0x180116048)
- GetCPInfo (Address: 0x180116020)
- GetCurrentDirectoryW (Address: 0x180116050)
- GetCurrentProcess (Address: 0x180116058)
- GetCurrentProcessId (Address: 0x180116060)
- GetCurrentThread (Address: 0x180116068)
- GetCurrentThreadId (Address: 0x180116070)
- GetDateFormatW (Address: 0x180116078)
- GetDriveTypeW (Address: 0x180116080)
- GetEnvironmentStringsW (Address: 0x180116088)
- GetEnvironmentVariableW (Address: 0x180116090)
- GetFileAttributesW (Address: 0x180116098)
- GetFileInformationByHandle (Address: 0x1801160a0)
- GetFileSizeEx (Address: 0x1801160a8)
- GetFileTime (Address: 0x1801160b0)
- GetFileType (Address: 0x1801160b8)
- GetFullPathNameW (Address: 0x1801160c0)
- GetLastError (Address: 0x1801160c8)
- GetLocaleInfoW (Address: 0x1801160d8)
- GetLocalTime (Address: 0x1801160d0)
- GetLogicalProcessorInformation (Address: 0x1801160e0)
- GetLongPathNameW (Address: 0x1801160e8)
- GetModuleFileNameW (Address: 0x1801160f0)
- GetModuleHandleA (Address: 0x1801160f8)
- GetModuleHandleExW (Address: 0x180116100)
- GetModuleHandleW (Address: 0x180116108)
- GetNativeSystemInfo (Address: 0x180116110)
- GetOEMCP (Address: 0x180116118)
- GetProcAddress (Address: 0x180116120)
- GetProcessHeap (Address: 0x180116128)
- GetProcessId (Address: 0x180116130)
- GetProductInfo (Address: 0x180116138)
- GetStartupInfoW (Address: 0x180116140)
- GetStdHandle (Address: 0x180116148)
- GetStringTypeW (Address: 0x180116150)
- GetSystemDirectoryW (Address: 0x180116158)
- GetSystemInfo (Address: 0x180116160)
- GetSystemTimeAsFileTime (Address: 0x180116168)
- GetTempPathW (Address: 0x180116170)
- GetThreadPriority (Address: 0x180116178)
- GetTickCount (Address: 0x180116180)
- GetTimeFormatW (Address: 0x180116188)
- GetTimeZoneInformation (Address: 0x180116190)
- GetUserDefaultLCID (Address: 0x180116198)
- GetVersionExW (Address: 0x1801161a0)
- GetWindowsDirectoryW (Address: 0x1801161a8)
- GlobalMemoryStatusEx (Address: 0x1801161b0)
- InitializeCriticalSection (Address: 0x1801161c0)
- InitializeCriticalSectionAndSpinCount (Address: 0x1801161c8)
- InitializeSListHead (Address: 0x1801161d0)
- InitOnceExecuteOnce (Address: 0x1801161b8)
- InterlockedFlushSList (Address: 0x1801161d8)
- IsDebuggerPresent (Address: 0x1801161e0)
- IsProcessorFeaturePresent (Address: 0x1801161e8)
- IsValidCodePage (Address: 0x1801161f0)
- IsValidLocale (Address: 0x1801161f8)
- IsWow64Process (Address: 0x180116200)
- K32GetMappedFileNameW (Address: 0x180116208)
- LCMapStringW (Address: 0x180116210)
- LeaveCriticalSection (Address: 0x180116218)
- LoadLibraryExA (Address: 0x180116220)
- LoadLibraryExW (Address: 0x180116228)
- LoadLibraryW (Address: 0x180116230)
- LocalFree (Address: 0x180116238)
- LockFileEx (Address: 0x180116240)
- lstrcmpiA (Address: 0x180116440)
- MultiByteToWideChar (Address: 0x180116248)
- OpenProcess (Address: 0x180116250)
- OutputDebugStringW (Address: 0x180116258)
- PeekNamedPipe (Address: 0x180116260)
- QueryPerformanceCounter (Address: 0x180116268)
- QueryPerformanceFrequency (Address: 0x180116270)
- QueryThreadCycleTime (Address: 0x180116278)
- RaiseException (Address: 0x180116280)
- ReadConsoleW (Address: 0x180116288)
- ReadFile (Address: 0x180116290)
- ReadProcessMemory (Address: 0x180116298)
- ReleaseMutex (Address: 0x1801162a0)
- ReleaseSRWLockExclusive (Address: 0x1801162a8)
- RemoveDirectoryW (Address: 0x1801162b0)
- RemoveVectoredExceptionHandler (Address: 0x1801162b8)
- ResetEvent (Address: 0x1801162c0)
- RtlCaptureContext (Address: 0x1801162c8)
- RtlCaptureStackBackTrace (Address: 0x1801162d0)
- RtlLookupFunctionEntry (Address: 0x1801162d8)
- RtlPcToFileHeader (Address: 0x1801162e0)
- RtlUnwind (Address: 0x1801162e8)
- RtlUnwindEx (Address: 0x1801162f0)
- RtlVirtualUnwind (Address: 0x1801162f8)
- SetConsoleCtrlHandler (Address: 0x180116300)
- SetEndOfFile (Address: 0x180116308)
- SetEnvironmentVariableW (Address: 0x180116310)
- SetEvent (Address: 0x180116318)
- SetFilePointerEx (Address: 0x180116320)
- SetLastError (Address: 0x180116328)
- SetNamedPipeHandleState (Address: 0x180116330)
- SetStdHandle (Address: 0x180116338)
- SetThreadPriority (Address: 0x180116340)
- SetUnhandledExceptionFilter (Address: 0x180116348)
- Sleep (Address: 0x180116350)
- SleepConditionVariableSRW (Address: 0x180116358)
- SleepEx (Address: 0x180116360)
- SystemTimeToTzSpecificLocalTime (Address: 0x180116368)
- TerminateProcess (Address: 0x180116370)
- TlsAlloc (Address: 0x180116378)
- TlsFree (Address: 0x180116380)
- TlsGetValue (Address: 0x180116388)
- TlsSetValue (Address: 0x180116390)
- TransactNamedPipe (Address: 0x180116398)
- TryAcquireSRWLockExclusive (Address: 0x1801163a0)
- UnhandledExceptionFilter (Address: 0x1801163a8)
- UnlockFileEx (Address: 0x1801163b0)
- UnmapViewOfFile (Address: 0x1801163b8)
- VerifyVersionInfoW (Address: 0x1801163c8)
- VerSetConditionMask (Address: 0x1801163c0)
- VirtualAlloc (Address: 0x1801163d0)
- VirtualFree (Address: 0x1801163d8)
- VirtualProtect (Address: 0x1801163e0)
- VirtualProtectEx (Address: 0x1801163e8)
- VirtualQuery (Address: 0x1801163f0)
- WaitForSingleObject (Address: 0x1801163f8)
- WaitForSingleObjectEx (Address: 0x180116400)
- WaitNamedPipeW (Address: 0x180116408)
- WakeAllConditionVariable (Address: 0x180116410)
- WerRegisterRuntimeExceptionModule (Address: 0x180116418)
- WideCharToMultiByte (Address: 0x180116420)
- WriteConsoleW (Address: 0x180116428)
- WriteFile (Address: 0x180116430)
- WriteProcessMemory (Address: 0x180116438)
ntdll.dll
- NtClose (Address: 0x180116450)
- NtCreateKey (Address: 0x180116458)
- NtDeleteKey (Address: 0x180116460)
- NtOpenKeyEx (Address: 0x180116468)
- NtQueryValueKey (Address: 0x180116470)
- NtSetValueKey (Address: 0x180116478)
- RtlFormatCurrentUserKeyPath (Address: 0x180116480)
- RtlFreeUnicodeString (Address: 0x180116488)
- RtlInitUnicodeString (Address: 0x180116490)