chrome_elf.dll

Description: Chromium

Authors: Copyright 2025 The Chromium Authors. All rights reserved.

Version: 133.0.6943.142

Architecture: 64-bit

Operating System: Windows

SHA256: 274466188b381de520ef14aa359d0f9f

File Size: 1.3 MB

Uploaded At: Dec. 2, 2025, 2:42 p.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, CreateRemoteThread

Exported Functions

  • ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xbd3a0)
  • CrashForException_ExportThunk (Ordinal: 2, Address: 0xbd2d0)
  • DisableHook (Ordinal: 3, Address: 0xbc870)
  • DrainLog (Ordinal: 4, Address: 0x17590)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xbd3b0)
  • DumpProcessWithoutCrash (Ordinal: 6, Address: 0xbc850)
  • GetApplyHookResult (Ordinal: 7, Address: 0x2d9d0)
  • GetBlockedModulesCount (Ordinal: 8, Address: 0xbcbb0)
  • GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xbd1f0)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xbd390)
  • GetHandleVerifier (Ordinal: 11, Address: 0x35d50)
  • GetInstallDetailsPayload (Ordinal: 12, Address: 0x18610)
  • GetProductInfo_ExportThunk (Ordinal: 13, Address: 0xbd330)
  • GetUniqueBlockedModulesCount (Ordinal: 14, Address: 0xbcbc0)
  • GetUploadConsent_ExportThunk (Ordinal: 15, Address: 0xbd300)
  • GetUserDataDirectoryThunk (Ordinal: 16, Address: 0xe050)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 17, Address: 0xbd360)
  • IsBrowserProcess (Ordinal: 18, Address: 0x12310)
  • IsCrashReportingEnabledImpl (Ordinal: 19, Address: 0x2fd40)
  • IsExtensionPointDisableSet (Ordinal: 20, Address: 0x1bd40)
  • IsTemporaryUserDataDirectoryCreatedForHeadless (Ordinal: 21, Address: 0xbc830)
  • IsThirdPartyInitialized (Ordinal: 22, Address: 0x2daa0)
  • RegisterLogNotification (Ordinal: 23, Address: 0x2d9e0)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 24, Address: 0xbd190)
  • SetCrashKeyValueImpl (Ordinal: 25, Address: 0x2fad0)
  • SetMetricsClientId (Ordinal: 26, Address: 0xbc860)
  • SetUploadConsent_ExportThunk (Ordinal: 27, Address: 0xbd2f0)
  • SignalChromeElf (Ordinal: 28, Address: 0x29560)
  • SignalInitializeCrashReporting (Ordinal: 29, Address: 0x27ac0)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180115f18)
  • AddVectoredExceptionHandler (Address: 0x180115f20)
  • CloseHandle (Address: 0x180115f28)
  • CompareStringW (Address: 0x180115f30)
  • CreateDirectoryW (Address: 0x180115f38)
  • CreateEventW (Address: 0x180115f40)
  • CreateFileW (Address: 0x180115f48)
  • CreateMutexW (Address: 0x180115f50)
  • CreateNamedPipeW (Address: 0x180115f58)
  • CreateProcessW (Address: 0x180115f60)
  • CreateRemoteThread (Address: 0x180115f68)
  • CreateThread (Address: 0x180115f70)
  • DeleteCriticalSection (Address: 0x180115f78)
  • DeleteFileW (Address: 0x180115f80)
  • DuplicateHandle (Address: 0x180115f88)
  • EncodePointer (Address: 0x180115f90)
  • EnterCriticalSection (Address: 0x180115f98)
  • EnumSystemLocalesW (Address: 0x180115fa0)
  • ExitProcess (Address: 0x180115fa8)
  • ExpandEnvironmentStringsW (Address: 0x180115fb0)
  • FileTimeToSystemTime (Address: 0x180115fb8)
  • FindClose (Address: 0x180115fc0)
  • FindFirstFileExW (Address: 0x180115fc8)
  • FindNextFileW (Address: 0x180115fd0)
  • FlsAlloc (Address: 0x180115fd8)
  • FlsFree (Address: 0x180115fe0)
  • FlsGetValue (Address: 0x180115fe8)
  • FlsSetValue (Address: 0x180115ff0)
  • FlushFileBuffers (Address: 0x180115ff8)
  • FormatMessageW (Address: 0x180116000)
  • FreeEnvironmentStringsW (Address: 0x180116008)
  • FreeLibrary (Address: 0x180116010)
  • GetACP (Address: 0x180116018)
  • GetCommandLineA (Address: 0x180116028)
  • GetCommandLineW (Address: 0x180116030)
  • GetComputerNameExW (Address: 0x180116038)
  • GetConsoleMode (Address: 0x180116040)
  • GetConsoleOutputCP (Address: 0x180116048)
  • GetCPInfo (Address: 0x180116020)
  • GetCurrentDirectoryW (Address: 0x180116050)
  • GetCurrentProcess (Address: 0x180116058)
  • GetCurrentProcessId (Address: 0x180116060)
  • GetCurrentThread (Address: 0x180116068)
  • GetCurrentThreadId (Address: 0x180116070)
  • GetDateFormatW (Address: 0x180116078)
  • GetDriveTypeW (Address: 0x180116080)
  • GetEnvironmentStringsW (Address: 0x180116088)
  • GetEnvironmentVariableW (Address: 0x180116090)
  • GetFileAttributesW (Address: 0x180116098)
  • GetFileInformationByHandle (Address: 0x1801160a0)
  • GetFileSizeEx (Address: 0x1801160a8)
  • GetFileTime (Address: 0x1801160b0)
  • GetFileType (Address: 0x1801160b8)
  • GetFullPathNameW (Address: 0x1801160c0)
  • GetLastError (Address: 0x1801160c8)
  • GetLocaleInfoW (Address: 0x1801160d8)
  • GetLocalTime (Address: 0x1801160d0)
  • GetLogicalProcessorInformation (Address: 0x1801160e0)
  • GetLongPathNameW (Address: 0x1801160e8)
  • GetModuleFileNameW (Address: 0x1801160f0)
  • GetModuleHandleA (Address: 0x1801160f8)
  • GetModuleHandleExW (Address: 0x180116100)
  • GetModuleHandleW (Address: 0x180116108)
  • GetNativeSystemInfo (Address: 0x180116110)
  • GetOEMCP (Address: 0x180116118)
  • GetProcAddress (Address: 0x180116120)
  • GetProcessHeap (Address: 0x180116128)
  • GetProcessId (Address: 0x180116130)
  • GetProductInfo (Address: 0x180116138)
  • GetStartupInfoW (Address: 0x180116140)
  • GetStdHandle (Address: 0x180116148)
  • GetStringTypeW (Address: 0x180116150)
  • GetSystemDirectoryW (Address: 0x180116158)
  • GetSystemInfo (Address: 0x180116160)
  • GetSystemTimeAsFileTime (Address: 0x180116168)
  • GetTempPathW (Address: 0x180116170)
  • GetThreadPriority (Address: 0x180116178)
  • GetTickCount (Address: 0x180116180)
  • GetTimeFormatW (Address: 0x180116188)
  • GetTimeZoneInformation (Address: 0x180116190)
  • GetUserDefaultLCID (Address: 0x180116198)
  • GetVersionExW (Address: 0x1801161a0)
  • GetWindowsDirectoryW (Address: 0x1801161a8)
  • GlobalMemoryStatusEx (Address: 0x1801161b0)
  • InitializeCriticalSection (Address: 0x1801161c0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1801161c8)
  • InitializeSListHead (Address: 0x1801161d0)
  • InitOnceExecuteOnce (Address: 0x1801161b8)
  • InterlockedFlushSList (Address: 0x1801161d8)
  • IsDebuggerPresent (Address: 0x1801161e0)
  • IsProcessorFeaturePresent (Address: 0x1801161e8)
  • IsValidCodePage (Address: 0x1801161f0)
  • IsValidLocale (Address: 0x1801161f8)
  • IsWow64Process (Address: 0x180116200)
  • K32GetMappedFileNameW (Address: 0x180116208)
  • LCMapStringW (Address: 0x180116210)
  • LeaveCriticalSection (Address: 0x180116218)
  • LoadLibraryExA (Address: 0x180116220)
  • LoadLibraryExW (Address: 0x180116228)
  • LoadLibraryW (Address: 0x180116230)
  • LocalFree (Address: 0x180116238)
  • LockFileEx (Address: 0x180116240)
  • lstrcmpiA (Address: 0x180116440)
  • MultiByteToWideChar (Address: 0x180116248)
  • OpenProcess (Address: 0x180116250)
  • OutputDebugStringW (Address: 0x180116258)
  • PeekNamedPipe (Address: 0x180116260)
  • QueryPerformanceCounter (Address: 0x180116268)
  • QueryPerformanceFrequency (Address: 0x180116270)
  • QueryThreadCycleTime (Address: 0x180116278)
  • RaiseException (Address: 0x180116280)
  • ReadConsoleW (Address: 0x180116288)
  • ReadFile (Address: 0x180116290)
  • ReadProcessMemory (Address: 0x180116298)
  • ReleaseMutex (Address: 0x1801162a0)
  • ReleaseSRWLockExclusive (Address: 0x1801162a8)
  • RemoveDirectoryW (Address: 0x1801162b0)
  • RemoveVectoredExceptionHandler (Address: 0x1801162b8)
  • ResetEvent (Address: 0x1801162c0)
  • RtlCaptureContext (Address: 0x1801162c8)
  • RtlCaptureStackBackTrace (Address: 0x1801162d0)
  • RtlLookupFunctionEntry (Address: 0x1801162d8)
  • RtlPcToFileHeader (Address: 0x1801162e0)
  • RtlUnwind (Address: 0x1801162e8)
  • RtlUnwindEx (Address: 0x1801162f0)
  • RtlVirtualUnwind (Address: 0x1801162f8)
  • SetConsoleCtrlHandler (Address: 0x180116300)
  • SetEndOfFile (Address: 0x180116308)
  • SetEnvironmentVariableW (Address: 0x180116310)
  • SetEvent (Address: 0x180116318)
  • SetFilePointerEx (Address: 0x180116320)
  • SetLastError (Address: 0x180116328)
  • SetNamedPipeHandleState (Address: 0x180116330)
  • SetStdHandle (Address: 0x180116338)
  • SetThreadPriority (Address: 0x180116340)
  • SetUnhandledExceptionFilter (Address: 0x180116348)
  • Sleep (Address: 0x180116350)
  • SleepConditionVariableSRW (Address: 0x180116358)
  • SleepEx (Address: 0x180116360)
  • SystemTimeToTzSpecificLocalTime (Address: 0x180116368)
  • TerminateProcess (Address: 0x180116370)
  • TlsAlloc (Address: 0x180116378)
  • TlsFree (Address: 0x180116380)
  • TlsGetValue (Address: 0x180116388)
  • TlsSetValue (Address: 0x180116390)
  • TransactNamedPipe (Address: 0x180116398)
  • TryAcquireSRWLockExclusive (Address: 0x1801163a0)
  • UnhandledExceptionFilter (Address: 0x1801163a8)
  • UnlockFileEx (Address: 0x1801163b0)
  • UnmapViewOfFile (Address: 0x1801163b8)
  • VerifyVersionInfoW (Address: 0x1801163c8)
  • VerSetConditionMask (Address: 0x1801163c0)
  • VirtualAlloc (Address: 0x1801163d0)
  • VirtualFree (Address: 0x1801163d8)
  • VirtualProtect (Address: 0x1801163e0)
  • VirtualProtectEx (Address: 0x1801163e8)
  • VirtualQuery (Address: 0x1801163f0)
  • WaitForSingleObject (Address: 0x1801163f8)
  • WaitForSingleObjectEx (Address: 0x180116400)
  • WaitNamedPipeW (Address: 0x180116408)
  • WakeAllConditionVariable (Address: 0x180116410)
  • WerRegisterRuntimeExceptionModule (Address: 0x180116418)
  • WideCharToMultiByte (Address: 0x180116420)
  • WriteConsoleW (Address: 0x180116428)
  • WriteFile (Address: 0x180116430)
  • WriteProcessMemory (Address: 0x180116438)
ntdll.dll
  • NtClose (Address: 0x180116450)
  • NtCreateKey (Address: 0x180116458)
  • NtDeleteKey (Address: 0x180116460)
  • NtOpenKeyEx (Address: 0x180116468)
  • NtQueryValueKey (Address: 0x180116470)
  • NtSetValueKey (Address: 0x180116478)
  • RtlFormatCurrentUserKeyPath (Address: 0x180116480)
  • RtlFreeUnicodeString (Address: 0x180116488)
  • RtlInitUnicodeString (Address: 0x180116490)