chrome_elf.dll
Description: Chromium
Authors: Copyright 2019 The Chromium Authors. All rights reserved.
Version: 77.0.3865.120
Architecture: 32-bit
Operating System: Windows
SHA256: 315fc2a3cb9e47e7e19c92514d954ecb
File Size: 846.9 KB
Uploaded At: Dec. 4, 2025, 6:17 a.m.
Views: 14
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread, OpenProcess
Exported Functions
- AddDllToBlacklist (Ordinal: 1, Address: 0x1a76e)
- CLInfo (Ordinal: 2, Address: 0x3d090)
- ClearReportsBetween_ExportThunk (Ordinal: 3, Address: 0x1324)
- CrashForException_ExportThunk (Ordinal: 4, Address: 0x12e6)
- DisableHook (Ordinal: 5, Address: 0x34e1b)
- DrainLog (Ordinal: 6, Address: 0x33ce3)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 7, Address: 0x1329)
- DumpProcessWithoutCrash (Ordinal: 8, Address: 0x1174)
- GetApplyHookResult (Ordinal: 9, Address: 0x34e23)
- GetBlockedModulesCount (Ordinal: 10, Address: 0x34258)
- GetCrashReports_ExportThunk (Ordinal: 11, Address: 0x124a)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 12, Address: 0x131f)
- GetHandleVerifier (Ordinal: 13, Address: 0x51760)
- GetInstallDetailsPayload (Ordinal: 14, Address: 0x1180)
- GetUniqueBlockedModulesCount (Ordinal: 15, Address: 0x3425e)
- GetUserDataDirectoryThunk (Ordinal: 16, Address: 0x100a)
- InjectDumpForHungInput_ExportThunk (Ordinal: 17, Address: 0x1305)
- IsBlacklistInitialized (Ordinal: 18, Address: 0x1400)
- IsCrashReportingEnabledImpl (Ordinal: 19, Address: 0x306f8)
- RegisterLogNotification (Ordinal: 20, Address: 0x341d9)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 21, Address: 0x1190)
- SetCrashKeyValueImpl (Ordinal: 22, Address: 0x305e0)
- SetMetricsClientId (Ordinal: 23, Address: 0x1179)
- SetUploadConsent_ExportThunk (Ordinal: 24, Address: 0x1300)
- SignalChromeElf (Ordinal: 25, Address: 0x1005)
- SignalInitializeCrashReporting (Ordinal: 26, Address: 0x1000)
- SuccessfullyBlocked (Ordinal: 27, Address: 0x1a7f1)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1ccca1c)
- CloseHandle (Address: 0x1ccca20)
- CompareStringW (Address: 0x1ccca24)
- CreateDirectoryW (Address: 0x1ccca28)
- CreateEventW (Address: 0x1ccca2c)
- CreateFileW (Address: 0x1ccca30)
- CreateMutexW (Address: 0x1ccca34)
- CreateNamedPipeW (Address: 0x1ccca38)
- CreateProcessW (Address: 0x1ccca3c)
- CreateRemoteThread (Address: 0x1ccca40)
- CreateThread (Address: 0x1ccca44)
- DecodePointer (Address: 0x1ccca48)
- DeleteCriticalSection (Address: 0x1ccca4c)
- DeleteFileW (Address: 0x1ccca50)
- DuplicateHandle (Address: 0x1ccca54)
- EncodePointer (Address: 0x1ccca58)
- EnterCriticalSection (Address: 0x1ccca5c)
- EnumSystemLocalesW (Address: 0x1ccca60)
- ExitProcess (Address: 0x1ccca64)
- ExpandEnvironmentStringsW (Address: 0x1ccca68)
- FileTimeToSystemTime (Address: 0x1ccca6c)
- FindClose (Address: 0x1ccca70)
- FindFirstFileExW (Address: 0x1ccca74)
- FindNextFileW (Address: 0x1ccca78)
- FlushFileBuffers (Address: 0x1ccca7c)
- FormatMessageA (Address: 0x1ccca80)
- FreeEnvironmentStringsW (Address: 0x1ccca84)
- FreeLibrary (Address: 0x1ccca88)
- GetACP (Address: 0x1ccca8c)
- GetCommandLineA (Address: 0x1ccca94)
- GetCommandLineW (Address: 0x1ccca98)
- GetComputerNameExW (Address: 0x1ccca9c)
- GetConsoleCP (Address: 0x1cccaa0)
- GetConsoleMode (Address: 0x1cccaa4)
- GetCPInfo (Address: 0x1ccca90)
- GetCurrentDirectoryW (Address: 0x1cccaa8)
- GetCurrentProcess (Address: 0x1cccaac)
- GetCurrentProcessId (Address: 0x1cccab0)
- GetCurrentThread (Address: 0x1cccab4)
- GetCurrentThreadId (Address: 0x1cccab8)
- GetDateFormatW (Address: 0x1cccabc)
- GetDriveTypeW (Address: 0x1cccac0)
- GetEnvironmentStringsW (Address: 0x1cccac4)
- GetEnvironmentVariableW (Address: 0x1cccac8)
- GetFileAttributesW (Address: 0x1cccacc)
- GetFileInformationByHandle (Address: 0x1cccad0)
- GetFileSizeEx (Address: 0x1cccad4)
- GetFileType (Address: 0x1cccad8)
- GetFullPathNameW (Address: 0x1cccadc)
- GetLastError (Address: 0x1cccae0)
- GetLocaleInfoW (Address: 0x1cccae8)
- GetLocalTime (Address: 0x1cccae4)
- GetLongPathNameW (Address: 0x1cccaec)
- GetModuleFileNameW (Address: 0x1cccaf0)
- GetModuleHandleExW (Address: 0x1cccaf4)
- GetModuleHandleW (Address: 0x1cccaf8)
- GetNativeSystemInfo (Address: 0x1cccafc)
- GetOEMCP (Address: 0x1cccb00)
- GetProcAddress (Address: 0x1cccb04)
- GetProcessId (Address: 0x1cccb08)
- GetProcessTimes (Address: 0x1cccb0c)
- GetProductInfo (Address: 0x1cccb10)
- GetStartupInfoW (Address: 0x1cccb14)
- GetStdHandle (Address: 0x1cccb18)
- GetStringTypeW (Address: 0x1cccb1c)
- GetSystemInfo (Address: 0x1cccb20)
- GetSystemTimeAsFileTime (Address: 0x1cccb24)
- GetTempPathW (Address: 0x1cccb28)
- GetThreadId (Address: 0x1cccb2c)
- GetThreadPriority (Address: 0x1cccb30)
- GetTickCount (Address: 0x1cccb34)
- GetTimeFormatW (Address: 0x1cccb38)
- GetTimeZoneInformation (Address: 0x1cccb3c)
- GetUserDefaultLCID (Address: 0x1cccb40)
- GetVersion (Address: 0x1cccb44)
- GetVersionExW (Address: 0x1cccb48)
- HeapAlloc (Address: 0x1cccb4c)
- HeapCreate (Address: 0x1cccb50)
- HeapDestroy (Address: 0x1cccb54)
- HeapFree (Address: 0x1cccb58)
- HeapReAlloc (Address: 0x1cccb5c)
- HeapSize (Address: 0x1cccb60)
- InitializeCriticalSection (Address: 0x1cccb68)
- InitializeCriticalSectionAndSpinCount (Address: 0x1cccb6c)
- InitializeSListHead (Address: 0x1cccb70)
- InitOnceExecuteOnce (Address: 0x1cccb64)
- InterlockedFlushSList (Address: 0x1cccb74)
- IsDebuggerPresent (Address: 0x1cccb78)
- IsProcessorFeaturePresent (Address: 0x1cccb7c)
- IsValidCodePage (Address: 0x1cccb80)
- IsValidLocale (Address: 0x1cccb84)
- IsWow64Process (Address: 0x1cccb88)
- LCMapStringW (Address: 0x1cccb8c)
- LeaveCriticalSection (Address: 0x1cccb90)
- LoadLibraryExA (Address: 0x1cccb94)
- LoadLibraryExW (Address: 0x1cccb98)
- LoadLibraryW (Address: 0x1cccb9c)
- LockFileEx (Address: 0x1cccba0)
- MultiByteToWideChar (Address: 0x1cccba4)
- OpenProcess (Address: 0x1cccba8)
- OutputDebugStringA (Address: 0x1cccbac)
- OutputDebugStringW (Address: 0x1cccbb0)
- PeekNamedPipe (Address: 0x1cccbb4)
- QueryPerformanceCounter (Address: 0x1cccbb8)
- QueryPerformanceFrequency (Address: 0x1cccbbc)
- QueryThreadCycleTime (Address: 0x1cccbc0)
- RaiseException (Address: 0x1cccbc4)
- ReadConsoleW (Address: 0x1cccbc8)
- ReadFile (Address: 0x1cccbcc)
- ReadProcessMemory (Address: 0x1cccbd0)
- ReleaseMutex (Address: 0x1cccbd4)
- ReleaseSRWLockExclusive (Address: 0x1cccbd8)
- RemoveDirectoryW (Address: 0x1cccbdc)
- ResetEvent (Address: 0x1cccbe0)
- RtlCaptureStackBackTrace (Address: 0x1cccbe4)
- RtlUnwind (Address: 0x1cccbe8)
- SetConsoleCtrlHandler (Address: 0x1cccbec)
- SetEndOfFile (Address: 0x1cccbf0)
- SetEnvironmentVariableW (Address: 0x1cccbf4)
- SetEvent (Address: 0x1cccbf8)
- SetFilePointerEx (Address: 0x1cccbfc)
- SetLastError (Address: 0x1cccc00)
- SetNamedPipeHandleState (Address: 0x1cccc04)
- SetStdHandle (Address: 0x1cccc08)
- SetThreadPriority (Address: 0x1cccc0c)
- SetUnhandledExceptionFilter (Address: 0x1cccc10)
- Sleep (Address: 0x1cccc14)
- SleepConditionVariableSRW (Address: 0x1cccc18)
- SleepEx (Address: 0x1cccc1c)
- SystemTimeToTzSpecificLocalTime (Address: 0x1cccc20)
- TerminateProcess (Address: 0x1cccc24)
- TlsAlloc (Address: 0x1cccc28)
- TlsFree (Address: 0x1cccc2c)
- TlsGetValue (Address: 0x1cccc30)
- TlsSetValue (Address: 0x1cccc34)
- TransactNamedPipe (Address: 0x1cccc38)
- TryAcquireSRWLockExclusive (Address: 0x1cccc3c)
- UnhandledExceptionFilter (Address: 0x1cccc40)
- UnlockFileEx (Address: 0x1cccc44)
- VerifyVersionInfoW (Address: 0x1cccc4c)
- VerSetConditionMask (Address: 0x1cccc48)
- VirtualProtect (Address: 0x1cccc50)
- VirtualProtectEx (Address: 0x1cccc54)
- VirtualQuery (Address: 0x1cccc58)
- WaitForSingleObject (Address: 0x1cccc5c)
- WaitForSingleObjectEx (Address: 0x1cccc60)
- WaitNamedPipeW (Address: 0x1cccc64)
- WakeAllConditionVariable (Address: 0x1cccc68)
- WideCharToMultiByte (Address: 0x1cccc6c)
- WriteConsoleW (Address: 0x1cccc70)
- WriteFile (Address: 0x1cccc74)
- WriteProcessMemory (Address: 0x1cccc78)