chrome_elf.dll
Description: Chromium
Authors: Copyright 2020 The Chromium Authors. All rights reserved.
Version: 86.0.4240.198
Architecture: 32-bit
Operating System: Windows
SHA256: a89ac6c4719e57487864456170ddd212
File Size: 841.5 KB
Uploaded At: Dec. 4, 2025, 6:15 a.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread, OpenProcess
Exported Functions
- ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0x35a0)
- CrashForException_ExportThunk (Ordinal: 2, Address: 0x3540)
- DisableHook (Ordinal: 3, Address: 0x1e70)
- DrainLog (Ordinal: 4, Address: 0x24a0)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0x35b0)
- DumpProcessWithoutCrash (Ordinal: 6, Address: 0x11b0)
- GetApplyHookResult (Ordinal: 7, Address: 0x1e80)
- GetBlockedModulesCount (Ordinal: 8, Address: 0x2a00)
- GetCrashReports_ExportThunk (Ordinal: 9, Address: 0x34a0)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0x3590)
- GetHandleVerifier (Ordinal: 11, Address: 0x376c0)
- GetInstallDetailsPayload (Ordinal: 12, Address: 0x33d0)
- GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0x2a10)
- GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x1020)
- InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0x3570)
- IsCrashReportingEnabledImpl (Ordinal: 16, Address: 0x27190)
- IsThirdPartyInitialized (Ordinal: 17, Address: 0x2e20)
- RegisterLogNotification (Ordinal: 18, Address: 0x2980)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 19, Address: 0x33e0)
- SetCrashKeyValueImpl (Ordinal: 20, Address: 0x27070)
- SetMetricsClientId (Ordinal: 21, Address: 0x11c0)
- SetUploadConsent_ExportThunk (Ordinal: 22, Address: 0x3560)
- SignalChromeElf (Ordinal: 23, Address: 0x1010)
- SignalInitializeCrashReporting (Ordinal: 24, Address: 0x1000)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1cc91bc)
- CloseHandle (Address: 0x1cc91c0)
- CompareStringW (Address: 0x1cc91c4)
- CreateDirectoryW (Address: 0x1cc91c8)
- CreateEventW (Address: 0x1cc91cc)
- CreateFileW (Address: 0x1cc91d0)
- CreateMutexW (Address: 0x1cc91d4)
- CreateNamedPipeW (Address: 0x1cc91d8)
- CreateProcessW (Address: 0x1cc91dc)
- CreateRemoteThread (Address: 0x1cc91e0)
- CreateThread (Address: 0x1cc91e4)
- DecodePointer (Address: 0x1cc91e8)
- DeleteCriticalSection (Address: 0x1cc91ec)
- DeleteFileW (Address: 0x1cc91f0)
- DuplicateHandle (Address: 0x1cc91f4)
- EncodePointer (Address: 0x1cc91f8)
- EnterCriticalSection (Address: 0x1cc91fc)
- EnumSystemLocalesW (Address: 0x1cc9200)
- ExitProcess (Address: 0x1cc9204)
- ExpandEnvironmentStringsW (Address: 0x1cc9208)
- FileTimeToSystemTime (Address: 0x1cc920c)
- FindClose (Address: 0x1cc9210)
- FindFirstFileExW (Address: 0x1cc9214)
- FindNextFileW (Address: 0x1cc9218)
- FlushFileBuffers (Address: 0x1cc921c)
- FormatMessageA (Address: 0x1cc9220)
- FreeEnvironmentStringsW (Address: 0x1cc9224)
- FreeLibrary (Address: 0x1cc9228)
- GetACP (Address: 0x1cc922c)
- GetCommandLineA (Address: 0x1cc9234)
- GetCommandLineW (Address: 0x1cc9238)
- GetComputerNameExW (Address: 0x1cc923c)
- GetConsoleMode (Address: 0x1cc9240)
- GetConsoleOutputCP (Address: 0x1cc9244)
- GetCPInfo (Address: 0x1cc9230)
- GetCurrentDirectoryW (Address: 0x1cc9248)
- GetCurrentProcess (Address: 0x1cc924c)
- GetCurrentProcessId (Address: 0x1cc9250)
- GetCurrentThread (Address: 0x1cc9254)
- GetCurrentThreadId (Address: 0x1cc9258)
- GetDateFormatW (Address: 0x1cc925c)
- GetDriveTypeW (Address: 0x1cc9260)
- GetEnvironmentStringsW (Address: 0x1cc9264)
- GetEnvironmentVariableW (Address: 0x1cc9268)
- GetFileAttributesW (Address: 0x1cc926c)
- GetFileInformationByHandle (Address: 0x1cc9270)
- GetFileSizeEx (Address: 0x1cc9274)
- GetFileTime (Address: 0x1cc9278)
- GetFileType (Address: 0x1cc927c)
- GetFullPathNameW (Address: 0x1cc9280)
- GetLastError (Address: 0x1cc9284)
- GetLocaleInfoW (Address: 0x1cc928c)
- GetLocalTime (Address: 0x1cc9288)
- GetLongPathNameW (Address: 0x1cc9290)
- GetModuleFileNameW (Address: 0x1cc9294)
- GetModuleHandleA (Address: 0x1cc9298)
- GetModuleHandleExW (Address: 0x1cc929c)
- GetModuleHandleW (Address: 0x1cc92a0)
- GetNativeSystemInfo (Address: 0x1cc92a4)
- GetOEMCP (Address: 0x1cc92a8)
- GetProcAddress (Address: 0x1cc92ac)
- GetProcessHeap (Address: 0x1cc92b0)
- GetProcessId (Address: 0x1cc92b4)
- GetProcessTimes (Address: 0x1cc92b8)
- GetProductInfo (Address: 0x1cc92bc)
- GetStartupInfoW (Address: 0x1cc92c0)
- GetStdHandle (Address: 0x1cc92c4)
- GetStringTypeW (Address: 0x1cc92c8)
- GetSystemInfo (Address: 0x1cc92cc)
- GetSystemTimeAsFileTime (Address: 0x1cc92d0)
- GetTempPathW (Address: 0x1cc92d4)
- GetThreadId (Address: 0x1cc92d8)
- GetThreadPriority (Address: 0x1cc92dc)
- GetTickCount (Address: 0x1cc92e0)
- GetTimeFormatW (Address: 0x1cc92e4)
- GetTimeZoneInformation (Address: 0x1cc92e8)
- GetUserDefaultLCID (Address: 0x1cc92ec)
- GetVersion (Address: 0x1cc92f0)
- GetVersionExW (Address: 0x1cc92f4)
- HeapAlloc (Address: 0x1cc92f8)
- HeapFree (Address: 0x1cc92fc)
- HeapReAlloc (Address: 0x1cc9300)
- HeapSize (Address: 0x1cc9304)
- InitializeCriticalSection (Address: 0x1cc930c)
- InitializeCriticalSectionAndSpinCount (Address: 0x1cc9310)
- InitializeSListHead (Address: 0x1cc9314)
- InitOnceExecuteOnce (Address: 0x1cc9308)
- InterlockedFlushSList (Address: 0x1cc9318)
- IsDebuggerPresent (Address: 0x1cc931c)
- IsProcessorFeaturePresent (Address: 0x1cc9320)
- IsValidCodePage (Address: 0x1cc9324)
- IsValidLocale (Address: 0x1cc9328)
- IsWow64Process (Address: 0x1cc932c)
- LCMapStringW (Address: 0x1cc9330)
- LeaveCriticalSection (Address: 0x1cc9334)
- LoadLibraryExA (Address: 0x1cc9338)
- LoadLibraryExW (Address: 0x1cc933c)
- LoadLibraryW (Address: 0x1cc9340)
- LocalFree (Address: 0x1cc9344)
- LockFileEx (Address: 0x1cc9348)
- lstrcmpiA (Address: 0x1cc9424)
- MultiByteToWideChar (Address: 0x1cc934c)
- OpenProcess (Address: 0x1cc9350)
- OutputDebugStringA (Address: 0x1cc9354)
- OutputDebugStringW (Address: 0x1cc9358)
- PeekNamedPipe (Address: 0x1cc935c)
- QueryPerformanceCounter (Address: 0x1cc9360)
- QueryPerformanceFrequency (Address: 0x1cc9364)
- QueryThreadCycleTime (Address: 0x1cc9368)
- RaiseException (Address: 0x1cc936c)
- ReadConsoleW (Address: 0x1cc9370)
- ReadFile (Address: 0x1cc9374)
- ReadProcessMemory (Address: 0x1cc9378)
- ReleaseMutex (Address: 0x1cc937c)
- ReleaseSRWLockExclusive (Address: 0x1cc9380)
- RemoveDirectoryW (Address: 0x1cc9384)
- ResetEvent (Address: 0x1cc9388)
- RtlCaptureStackBackTrace (Address: 0x1cc938c)
- RtlUnwind (Address: 0x1cc9390)
- SetConsoleCtrlHandler (Address: 0x1cc9394)
- SetEndOfFile (Address: 0x1cc9398)
- SetEnvironmentVariableW (Address: 0x1cc939c)
- SetEvent (Address: 0x1cc93a0)
- SetFilePointerEx (Address: 0x1cc93a4)
- SetLastError (Address: 0x1cc93a8)
- SetNamedPipeHandleState (Address: 0x1cc93ac)
- SetStdHandle (Address: 0x1cc93b0)
- SetThreadPriority (Address: 0x1cc93b4)
- SetUnhandledExceptionFilter (Address: 0x1cc93b8)
- Sleep (Address: 0x1cc93bc)
- SleepConditionVariableSRW (Address: 0x1cc93c0)
- SleepEx (Address: 0x1cc93c4)
- SystemTimeToTzSpecificLocalTime (Address: 0x1cc93c8)
- TerminateProcess (Address: 0x1cc93cc)
- TlsAlloc (Address: 0x1cc93d0)
- TlsFree (Address: 0x1cc93d4)
- TlsGetValue (Address: 0x1cc93d8)
- TlsSetValue (Address: 0x1cc93dc)
- TransactNamedPipe (Address: 0x1cc93e0)
- TryAcquireSRWLockExclusive (Address: 0x1cc93e4)
- UnhandledExceptionFilter (Address: 0x1cc93e8)
- UnlockFileEx (Address: 0x1cc93ec)
- VerifyVersionInfoW (Address: 0x1cc93f4)
- VerSetConditionMask (Address: 0x1cc93f0)
- VirtualProtect (Address: 0x1cc93f8)
- VirtualProtectEx (Address: 0x1cc93fc)
- VirtualQuery (Address: 0x1cc9400)
- WaitForSingleObject (Address: 0x1cc9404)
- WaitForSingleObjectEx (Address: 0x1cc9408)
- WaitNamedPipeW (Address: 0x1cc940c)
- WakeAllConditionVariable (Address: 0x1cc9410)
- WideCharToMultiByte (Address: 0x1cc9414)
- WriteConsoleW (Address: 0x1cc9418)
- WriteFile (Address: 0x1cc941c)
- WriteProcessMemory (Address: 0x1cc9420)