chrome_elf.dll

Description: Chromium

Authors: Copyright 2019 The Chromium Authors. All rights reserved.

Version: 77.0.3865.120

Architecture: 32-bit

Operating System: Windows

SHA256: 315fc2a3cb9e47e7e19c92514d954ecb

File Size: 846.9 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 14

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread, OpenProcess

Exported Functions

  • AddDllToBlacklist (Ordinal: 1, Address: 0x1a76e)
  • CLInfo (Ordinal: 2, Address: 0x3d090)
  • ClearReportsBetween_ExportThunk (Ordinal: 3, Address: 0x1324)
  • CrashForException_ExportThunk (Ordinal: 4, Address: 0x12e6)
  • DisableHook (Ordinal: 5, Address: 0x34e1b)
  • DrainLog (Ordinal: 6, Address: 0x33ce3)
  • DumpHungProcessWithPtype_ExportThunk (Ordinal: 7, Address: 0x1329)
  • DumpProcessWithoutCrash (Ordinal: 8, Address: 0x1174)
  • GetApplyHookResult (Ordinal: 9, Address: 0x34e23)
  • GetBlockedModulesCount (Ordinal: 10, Address: 0x34258)
  • GetCrashReports_ExportThunk (Ordinal: 11, Address: 0x124a)
  • GetCrashpadDatabasePath_ExportThunk (Ordinal: 12, Address: 0x131f)
  • GetHandleVerifier (Ordinal: 13, Address: 0x51760)
  • GetInstallDetailsPayload (Ordinal: 14, Address: 0x1180)
  • GetUniqueBlockedModulesCount (Ordinal: 15, Address: 0x3425e)
  • GetUserDataDirectoryThunk (Ordinal: 16, Address: 0x100a)
  • InjectDumpForHungInput_ExportThunk (Ordinal: 17, Address: 0x1305)
  • IsBlacklistInitialized (Ordinal: 18, Address: 0x1400)
  • IsCrashReportingEnabledImpl (Ordinal: 19, Address: 0x306f8)
  • RegisterLogNotification (Ordinal: 20, Address: 0x341d9)
  • RequestSingleCrashUpload_ExportThunk (Ordinal: 21, Address: 0x1190)
  • SetCrashKeyValueImpl (Ordinal: 22, Address: 0x305e0)
  • SetMetricsClientId (Ordinal: 23, Address: 0x1179)
  • SetUploadConsent_ExportThunk (Ordinal: 24, Address: 0x1300)
  • SignalChromeElf (Ordinal: 25, Address: 0x1005)
  • SignalInitializeCrashReporting (Ordinal: 26, Address: 0x1000)
  • SuccessfullyBlocked (Ordinal: 27, Address: 0x1a7f1)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1ccca1c)
  • CloseHandle (Address: 0x1ccca20)
  • CompareStringW (Address: 0x1ccca24)
  • CreateDirectoryW (Address: 0x1ccca28)
  • CreateEventW (Address: 0x1ccca2c)
  • CreateFileW (Address: 0x1ccca30)
  • CreateMutexW (Address: 0x1ccca34)
  • CreateNamedPipeW (Address: 0x1ccca38)
  • CreateProcessW (Address: 0x1ccca3c)
  • CreateRemoteThread (Address: 0x1ccca40)
  • CreateThread (Address: 0x1ccca44)
  • DecodePointer (Address: 0x1ccca48)
  • DeleteCriticalSection (Address: 0x1ccca4c)
  • DeleteFileW (Address: 0x1ccca50)
  • DuplicateHandle (Address: 0x1ccca54)
  • EncodePointer (Address: 0x1ccca58)
  • EnterCriticalSection (Address: 0x1ccca5c)
  • EnumSystemLocalesW (Address: 0x1ccca60)
  • ExitProcess (Address: 0x1ccca64)
  • ExpandEnvironmentStringsW (Address: 0x1ccca68)
  • FileTimeToSystemTime (Address: 0x1ccca6c)
  • FindClose (Address: 0x1ccca70)
  • FindFirstFileExW (Address: 0x1ccca74)
  • FindNextFileW (Address: 0x1ccca78)
  • FlushFileBuffers (Address: 0x1ccca7c)
  • FormatMessageA (Address: 0x1ccca80)
  • FreeEnvironmentStringsW (Address: 0x1ccca84)
  • FreeLibrary (Address: 0x1ccca88)
  • GetACP (Address: 0x1ccca8c)
  • GetCommandLineA (Address: 0x1ccca94)
  • GetCommandLineW (Address: 0x1ccca98)
  • GetComputerNameExW (Address: 0x1ccca9c)
  • GetConsoleCP (Address: 0x1cccaa0)
  • GetConsoleMode (Address: 0x1cccaa4)
  • GetCPInfo (Address: 0x1ccca90)
  • GetCurrentDirectoryW (Address: 0x1cccaa8)
  • GetCurrentProcess (Address: 0x1cccaac)
  • GetCurrentProcessId (Address: 0x1cccab0)
  • GetCurrentThread (Address: 0x1cccab4)
  • GetCurrentThreadId (Address: 0x1cccab8)
  • GetDateFormatW (Address: 0x1cccabc)
  • GetDriveTypeW (Address: 0x1cccac0)
  • GetEnvironmentStringsW (Address: 0x1cccac4)
  • GetEnvironmentVariableW (Address: 0x1cccac8)
  • GetFileAttributesW (Address: 0x1cccacc)
  • GetFileInformationByHandle (Address: 0x1cccad0)
  • GetFileSizeEx (Address: 0x1cccad4)
  • GetFileType (Address: 0x1cccad8)
  • GetFullPathNameW (Address: 0x1cccadc)
  • GetLastError (Address: 0x1cccae0)
  • GetLocaleInfoW (Address: 0x1cccae8)
  • GetLocalTime (Address: 0x1cccae4)
  • GetLongPathNameW (Address: 0x1cccaec)
  • GetModuleFileNameW (Address: 0x1cccaf0)
  • GetModuleHandleExW (Address: 0x1cccaf4)
  • GetModuleHandleW (Address: 0x1cccaf8)
  • GetNativeSystemInfo (Address: 0x1cccafc)
  • GetOEMCP (Address: 0x1cccb00)
  • GetProcAddress (Address: 0x1cccb04)
  • GetProcessId (Address: 0x1cccb08)
  • GetProcessTimes (Address: 0x1cccb0c)
  • GetProductInfo (Address: 0x1cccb10)
  • GetStartupInfoW (Address: 0x1cccb14)
  • GetStdHandle (Address: 0x1cccb18)
  • GetStringTypeW (Address: 0x1cccb1c)
  • GetSystemInfo (Address: 0x1cccb20)
  • GetSystemTimeAsFileTime (Address: 0x1cccb24)
  • GetTempPathW (Address: 0x1cccb28)
  • GetThreadId (Address: 0x1cccb2c)
  • GetThreadPriority (Address: 0x1cccb30)
  • GetTickCount (Address: 0x1cccb34)
  • GetTimeFormatW (Address: 0x1cccb38)
  • GetTimeZoneInformation (Address: 0x1cccb3c)
  • GetUserDefaultLCID (Address: 0x1cccb40)
  • GetVersion (Address: 0x1cccb44)
  • GetVersionExW (Address: 0x1cccb48)
  • HeapAlloc (Address: 0x1cccb4c)
  • HeapCreate (Address: 0x1cccb50)
  • HeapDestroy (Address: 0x1cccb54)
  • HeapFree (Address: 0x1cccb58)
  • HeapReAlloc (Address: 0x1cccb5c)
  • HeapSize (Address: 0x1cccb60)
  • InitializeCriticalSection (Address: 0x1cccb68)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1cccb6c)
  • InitializeSListHead (Address: 0x1cccb70)
  • InitOnceExecuteOnce (Address: 0x1cccb64)
  • InterlockedFlushSList (Address: 0x1cccb74)
  • IsDebuggerPresent (Address: 0x1cccb78)
  • IsProcessorFeaturePresent (Address: 0x1cccb7c)
  • IsValidCodePage (Address: 0x1cccb80)
  • IsValidLocale (Address: 0x1cccb84)
  • IsWow64Process (Address: 0x1cccb88)
  • LCMapStringW (Address: 0x1cccb8c)
  • LeaveCriticalSection (Address: 0x1cccb90)
  • LoadLibraryExA (Address: 0x1cccb94)
  • LoadLibraryExW (Address: 0x1cccb98)
  • LoadLibraryW (Address: 0x1cccb9c)
  • LockFileEx (Address: 0x1cccba0)
  • MultiByteToWideChar (Address: 0x1cccba4)
  • OpenProcess (Address: 0x1cccba8)
  • OutputDebugStringA (Address: 0x1cccbac)
  • OutputDebugStringW (Address: 0x1cccbb0)
  • PeekNamedPipe (Address: 0x1cccbb4)
  • QueryPerformanceCounter (Address: 0x1cccbb8)
  • QueryPerformanceFrequency (Address: 0x1cccbbc)
  • QueryThreadCycleTime (Address: 0x1cccbc0)
  • RaiseException (Address: 0x1cccbc4)
  • ReadConsoleW (Address: 0x1cccbc8)
  • ReadFile (Address: 0x1cccbcc)
  • ReadProcessMemory (Address: 0x1cccbd0)
  • ReleaseMutex (Address: 0x1cccbd4)
  • ReleaseSRWLockExclusive (Address: 0x1cccbd8)
  • RemoveDirectoryW (Address: 0x1cccbdc)
  • ResetEvent (Address: 0x1cccbe0)
  • RtlCaptureStackBackTrace (Address: 0x1cccbe4)
  • RtlUnwind (Address: 0x1cccbe8)
  • SetConsoleCtrlHandler (Address: 0x1cccbec)
  • SetEndOfFile (Address: 0x1cccbf0)
  • SetEnvironmentVariableW (Address: 0x1cccbf4)
  • SetEvent (Address: 0x1cccbf8)
  • SetFilePointerEx (Address: 0x1cccbfc)
  • SetLastError (Address: 0x1cccc00)
  • SetNamedPipeHandleState (Address: 0x1cccc04)
  • SetStdHandle (Address: 0x1cccc08)
  • SetThreadPriority (Address: 0x1cccc0c)
  • SetUnhandledExceptionFilter (Address: 0x1cccc10)
  • Sleep (Address: 0x1cccc14)
  • SleepConditionVariableSRW (Address: 0x1cccc18)
  • SleepEx (Address: 0x1cccc1c)
  • SystemTimeToTzSpecificLocalTime (Address: 0x1cccc20)
  • TerminateProcess (Address: 0x1cccc24)
  • TlsAlloc (Address: 0x1cccc28)
  • TlsFree (Address: 0x1cccc2c)
  • TlsGetValue (Address: 0x1cccc30)
  • TlsSetValue (Address: 0x1cccc34)
  • TransactNamedPipe (Address: 0x1cccc38)
  • TryAcquireSRWLockExclusive (Address: 0x1cccc3c)
  • UnhandledExceptionFilter (Address: 0x1cccc40)
  • UnlockFileEx (Address: 0x1cccc44)
  • VerifyVersionInfoW (Address: 0x1cccc4c)
  • VerSetConditionMask (Address: 0x1cccc48)
  • VirtualProtect (Address: 0x1cccc50)
  • VirtualProtectEx (Address: 0x1cccc54)
  • VirtualQuery (Address: 0x1cccc58)
  • WaitForSingleObject (Address: 0x1cccc5c)
  • WaitForSingleObjectEx (Address: 0x1cccc60)
  • WaitNamedPipeW (Address: 0x1cccc64)
  • WakeAllConditionVariable (Address: 0x1cccc68)
  • WideCharToMultiByte (Address: 0x1cccc6c)
  • WriteConsoleW (Address: 0x1cccc70)
  • WriteFile (Address: 0x1cccc74)
  • WriteProcessMemory (Address: 0x1cccc78)