chrome_elf.dll

Description: Chromium

Authors: Copyright 2020 The Chromium Authors. All rights reserved.

Version: 86.0.4240.198

Architecture: 32-bit

Operating System: Windows

SHA256: a89ac6c4719e57487864456170ddd212

File Size: 841.5 KB

Uploaded At: Dec. 4, 2025, 6:15 a.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread, OpenProcess

Exported Functions

  • ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0x35a0)
  • CrashForException_ExportThunk (Ordinal: 2, Address: 0x3540)
  • DisableHook (Ordinal: 3, Address: 0x1e70)
  • DrainLog (Ordinal: 4, Address: 0x24a0)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0x35b0)
  • DumpProcessWithoutCrash (Ordinal: 6, Address: 0x11b0)
  • GetApplyHookResult (Ordinal: 7, Address: 0x1e80)
  • GetBlockedModulesCount (Ordinal: 8, Address: 0x2a00)
  • GetCrashReports_ExportThunk (Ordinal: 9, Address: 0x34a0)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0x3590)
  • GetHandleVerifier (Ordinal: 11, Address: 0x376c0)
  • GetInstallDetailsPayload (Ordinal: 12, Address: 0x33d0)
  • GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0x2a10)
  • GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x1020)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0x3570)
  • IsCrashReportingEnabledImpl (Ordinal: 16, Address: 0x27190)
  • IsThirdPartyInitialized (Ordinal: 17, Address: 0x2e20)
  • RegisterLogNotification (Ordinal: 18, Address: 0x2980)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 19, Address: 0x33e0)
  • SetCrashKeyValueImpl (Ordinal: 20, Address: 0x27070)
  • SetMetricsClientId (Ordinal: 21, Address: 0x11c0)
  • SetUploadConsent_ExportThunk (Ordinal: 22, Address: 0x3560)
  • SignalChromeElf (Ordinal: 23, Address: 0x1010)
  • SignalInitializeCrashReporting (Ordinal: 24, Address: 0x1000)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1cc91bc)
  • CloseHandle (Address: 0x1cc91c0)
  • CompareStringW (Address: 0x1cc91c4)
  • CreateDirectoryW (Address: 0x1cc91c8)
  • CreateEventW (Address: 0x1cc91cc)
  • CreateFileW (Address: 0x1cc91d0)
  • CreateMutexW (Address: 0x1cc91d4)
  • CreateNamedPipeW (Address: 0x1cc91d8)
  • CreateProcessW (Address: 0x1cc91dc)
  • CreateRemoteThread (Address: 0x1cc91e0)
  • CreateThread (Address: 0x1cc91e4)
  • DecodePointer (Address: 0x1cc91e8)
  • DeleteCriticalSection (Address: 0x1cc91ec)
  • DeleteFileW (Address: 0x1cc91f0)
  • DuplicateHandle (Address: 0x1cc91f4)
  • EncodePointer (Address: 0x1cc91f8)
  • EnterCriticalSection (Address: 0x1cc91fc)
  • EnumSystemLocalesW (Address: 0x1cc9200)
  • ExitProcess (Address: 0x1cc9204)
  • ExpandEnvironmentStringsW (Address: 0x1cc9208)
  • FileTimeToSystemTime (Address: 0x1cc920c)
  • FindClose (Address: 0x1cc9210)
  • FindFirstFileExW (Address: 0x1cc9214)
  • FindNextFileW (Address: 0x1cc9218)
  • FlushFileBuffers (Address: 0x1cc921c)
  • FormatMessageA (Address: 0x1cc9220)
  • FreeEnvironmentStringsW (Address: 0x1cc9224)
  • FreeLibrary (Address: 0x1cc9228)
  • GetACP (Address: 0x1cc922c)
  • GetCommandLineA (Address: 0x1cc9234)
  • GetCommandLineW (Address: 0x1cc9238)
  • GetComputerNameExW (Address: 0x1cc923c)
  • GetConsoleMode (Address: 0x1cc9240)
  • GetConsoleOutputCP (Address: 0x1cc9244)
  • GetCPInfo (Address: 0x1cc9230)
  • GetCurrentDirectoryW (Address: 0x1cc9248)
  • GetCurrentProcess (Address: 0x1cc924c)
  • GetCurrentProcessId (Address: 0x1cc9250)
  • GetCurrentThread (Address: 0x1cc9254)
  • GetCurrentThreadId (Address: 0x1cc9258)
  • GetDateFormatW (Address: 0x1cc925c)
  • GetDriveTypeW (Address: 0x1cc9260)
  • GetEnvironmentStringsW (Address: 0x1cc9264)
  • GetEnvironmentVariableW (Address: 0x1cc9268)
  • GetFileAttributesW (Address: 0x1cc926c)
  • GetFileInformationByHandle (Address: 0x1cc9270)
  • GetFileSizeEx (Address: 0x1cc9274)
  • GetFileTime (Address: 0x1cc9278)
  • GetFileType (Address: 0x1cc927c)
  • GetFullPathNameW (Address: 0x1cc9280)
  • GetLastError (Address: 0x1cc9284)
  • GetLocaleInfoW (Address: 0x1cc928c)
  • GetLocalTime (Address: 0x1cc9288)
  • GetLongPathNameW (Address: 0x1cc9290)
  • GetModuleFileNameW (Address: 0x1cc9294)
  • GetModuleHandleA (Address: 0x1cc9298)
  • GetModuleHandleExW (Address: 0x1cc929c)
  • GetModuleHandleW (Address: 0x1cc92a0)
  • GetNativeSystemInfo (Address: 0x1cc92a4)
  • GetOEMCP (Address: 0x1cc92a8)
  • GetProcAddress (Address: 0x1cc92ac)
  • GetProcessHeap (Address: 0x1cc92b0)
  • GetProcessId (Address: 0x1cc92b4)
  • GetProcessTimes (Address: 0x1cc92b8)
  • GetProductInfo (Address: 0x1cc92bc)
  • GetStartupInfoW (Address: 0x1cc92c0)
  • GetStdHandle (Address: 0x1cc92c4)
  • GetStringTypeW (Address: 0x1cc92c8)
  • GetSystemInfo (Address: 0x1cc92cc)
  • GetSystemTimeAsFileTime (Address: 0x1cc92d0)
  • GetTempPathW (Address: 0x1cc92d4)
  • GetThreadId (Address: 0x1cc92d8)
  • GetThreadPriority (Address: 0x1cc92dc)
  • GetTickCount (Address: 0x1cc92e0)
  • GetTimeFormatW (Address: 0x1cc92e4)
  • GetTimeZoneInformation (Address: 0x1cc92e8)
  • GetUserDefaultLCID (Address: 0x1cc92ec)
  • GetVersion (Address: 0x1cc92f0)
  • GetVersionExW (Address: 0x1cc92f4)
  • HeapAlloc (Address: 0x1cc92f8)
  • HeapFree (Address: 0x1cc92fc)
  • HeapReAlloc (Address: 0x1cc9300)
  • HeapSize (Address: 0x1cc9304)
  • InitializeCriticalSection (Address: 0x1cc930c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1cc9310)
  • InitializeSListHead (Address: 0x1cc9314)
  • InitOnceExecuteOnce (Address: 0x1cc9308)
  • InterlockedFlushSList (Address: 0x1cc9318)
  • IsDebuggerPresent (Address: 0x1cc931c)
  • IsProcessorFeaturePresent (Address: 0x1cc9320)
  • IsValidCodePage (Address: 0x1cc9324)
  • IsValidLocale (Address: 0x1cc9328)
  • IsWow64Process (Address: 0x1cc932c)
  • LCMapStringW (Address: 0x1cc9330)
  • LeaveCriticalSection (Address: 0x1cc9334)
  • LoadLibraryExA (Address: 0x1cc9338)
  • LoadLibraryExW (Address: 0x1cc933c)
  • LoadLibraryW (Address: 0x1cc9340)
  • LocalFree (Address: 0x1cc9344)
  • LockFileEx (Address: 0x1cc9348)
  • lstrcmpiA (Address: 0x1cc9424)
  • MultiByteToWideChar (Address: 0x1cc934c)
  • OpenProcess (Address: 0x1cc9350)
  • OutputDebugStringA (Address: 0x1cc9354)
  • OutputDebugStringW (Address: 0x1cc9358)
  • PeekNamedPipe (Address: 0x1cc935c)
  • QueryPerformanceCounter (Address: 0x1cc9360)
  • QueryPerformanceFrequency (Address: 0x1cc9364)
  • QueryThreadCycleTime (Address: 0x1cc9368)
  • RaiseException (Address: 0x1cc936c)
  • ReadConsoleW (Address: 0x1cc9370)
  • ReadFile (Address: 0x1cc9374)
  • ReadProcessMemory (Address: 0x1cc9378)
  • ReleaseMutex (Address: 0x1cc937c)
  • ReleaseSRWLockExclusive (Address: 0x1cc9380)
  • RemoveDirectoryW (Address: 0x1cc9384)
  • ResetEvent (Address: 0x1cc9388)
  • RtlCaptureStackBackTrace (Address: 0x1cc938c)
  • RtlUnwind (Address: 0x1cc9390)
  • SetConsoleCtrlHandler (Address: 0x1cc9394)
  • SetEndOfFile (Address: 0x1cc9398)
  • SetEnvironmentVariableW (Address: 0x1cc939c)
  • SetEvent (Address: 0x1cc93a0)
  • SetFilePointerEx (Address: 0x1cc93a4)
  • SetLastError (Address: 0x1cc93a8)
  • SetNamedPipeHandleState (Address: 0x1cc93ac)
  • SetStdHandle (Address: 0x1cc93b0)
  • SetThreadPriority (Address: 0x1cc93b4)
  • SetUnhandledExceptionFilter (Address: 0x1cc93b8)
  • Sleep (Address: 0x1cc93bc)
  • SleepConditionVariableSRW (Address: 0x1cc93c0)
  • SleepEx (Address: 0x1cc93c4)
  • SystemTimeToTzSpecificLocalTime (Address: 0x1cc93c8)
  • TerminateProcess (Address: 0x1cc93cc)
  • TlsAlloc (Address: 0x1cc93d0)
  • TlsFree (Address: 0x1cc93d4)
  • TlsGetValue (Address: 0x1cc93d8)
  • TlsSetValue (Address: 0x1cc93dc)
  • TransactNamedPipe (Address: 0x1cc93e0)
  • TryAcquireSRWLockExclusive (Address: 0x1cc93e4)
  • UnhandledExceptionFilter (Address: 0x1cc93e8)
  • UnlockFileEx (Address: 0x1cc93ec)
  • VerifyVersionInfoW (Address: 0x1cc93f4)
  • VerSetConditionMask (Address: 0x1cc93f0)
  • VirtualProtect (Address: 0x1cc93f8)
  • VirtualProtectEx (Address: 0x1cc93fc)
  • VirtualQuery (Address: 0x1cc9400)
  • WaitForSingleObject (Address: 0x1cc9404)
  • WaitForSingleObjectEx (Address: 0x1cc9408)
  • WaitNamedPipeW (Address: 0x1cc940c)
  • WakeAllConditionVariable (Address: 0x1cc9410)
  • WideCharToMultiByte (Address: 0x1cc9414)
  • WriteConsoleW (Address: 0x1cc9418)
  • WriteFile (Address: 0x1cc941c)
  • WriteProcessMemory (Address: 0x1cc9420)