chrome_elf.dll
Description: Chromium
Authors: Copyright 2024 The Chromium Authors. All rights reserved.
Version: 126.0.6478.183
Architecture: 64-bit
Operating System: Windows
SHA256: b253997ec12d825ff5a560072fc71a4b
File Size: 1.3 MB
Uploaded At: Dec. 4, 2025, 6:19 a.m.
Views: 16
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, CreateRemoteThread, OpenProcess
Exported Functions
- ClearReportsBetween_ExportThunk (Ordinal: 1, Address: 0xb58e0)
- CrashForException_ExportThunk (Ordinal: 2, Address: 0xb5870)
- DisableHook (Ordinal: 3, Address: 0xb4e20)
- DrainLog (Ordinal: 4, Address: 0x1a650)
- DumpHungProcessWithPtype_ExportThunk (Ordinal: 5, Address: 0xb58f0)
- DumpProcessWithoutCrash (Ordinal: 6, Address: 0xb4db0)
- GetApplyHookResult (Ordinal: 7, Address: 0x1a160)
- GetBlockedModulesCount (Ordinal: 8, Address: 0xb5070)
- GetCrashReports_ExportThunk (Ordinal: 9, Address: 0xb57b0)
- GetCrashpadDatabasePath_ExportThunk (Ordinal: 10, Address: 0xb58d0)
- GetHandleVerifier (Ordinal: 11, Address: 0x42850)
- GetInstallDetailsPayload (Ordinal: 12, Address: 0x1b890)
- GetUniqueBlockedModulesCount (Ordinal: 13, Address: 0xb5080)
- GetUserDataDirectoryThunk (Ordinal: 14, Address: 0x19ae0)
- InjectDumpForHungInput_ExportThunk (Ordinal: 15, Address: 0xb58a0)
- IsBrowserProcess (Ordinal: 16, Address: 0x19c40)
- IsCrashReportingEnabledImpl (Ordinal: 17, Address: 0x31de0)
- IsExtensionPointDisableSet (Ordinal: 18, Address: 0x19c50)
- IsThirdPartyInitialized (Ordinal: 19, Address: 0x1b2a0)
- RegisterLogNotification (Ordinal: 20, Address: 0x1ae10)
- RequestSingleCrashUpload_ExportThunk (Ordinal: 21, Address: 0xb5760)
- SetCrashKeyValueImpl (Ordinal: 22, Address: 0x31ae0)
- SetMetricsClientId (Ordinal: 23, Address: 0x19c30)
- SetUploadConsent_ExportThunk (Ordinal: 24, Address: 0xb5890)
- SignalChromeElf (Ordinal: 25, Address: 0x19ad0)
- SignalInitializeCrashReporting (Ordinal: 26, Address: 0x19ac0)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180114b78)
- AddVectoredExceptionHandler (Address: 0x180114b80)
- CloseHandle (Address: 0x180114b88)
- CompareStringW (Address: 0x180114b90)
- CreateDirectoryW (Address: 0x180114b98)
- CreateEventW (Address: 0x180114ba0)
- CreateFileW (Address: 0x180114ba8)
- CreateMutexW (Address: 0x180114bb0)
- CreateNamedPipeW (Address: 0x180114bb8)
- CreateProcessW (Address: 0x180114bc0)
- CreateRemoteThread (Address: 0x180114bc8)
- CreateThread (Address: 0x180114bd0)
- DeleteCriticalSection (Address: 0x180114bd8)
- DeleteFileW (Address: 0x180114be0)
- DuplicateHandle (Address: 0x180114be8)
- EncodePointer (Address: 0x180114bf0)
- EnterCriticalSection (Address: 0x180114bf8)
- EnumSystemLocalesW (Address: 0x180114c00)
- ExitProcess (Address: 0x180114c08)
- ExitThread (Address: 0x180114c10)
- ExpandEnvironmentStringsW (Address: 0x180114c18)
- FileTimeToSystemTime (Address: 0x180114c20)
- FindClose (Address: 0x180114c28)
- FindFirstFileExW (Address: 0x180114c30)
- FindNextFileW (Address: 0x180114c38)
- FlsAlloc (Address: 0x180114c40)
- FlsFree (Address: 0x180114c48)
- FlsGetValue (Address: 0x180114c50)
- FlsSetValue (Address: 0x180114c58)
- FlushFileBuffers (Address: 0x180114c60)
- FormatMessageW (Address: 0x180114c68)
- FreeEnvironmentStringsW (Address: 0x180114c70)
- FreeLibrary (Address: 0x180114c78)
- FreeLibraryAndExitThread (Address: 0x180114c80)
- GetACP (Address: 0x180114c88)
- GetCommandLineA (Address: 0x180114c98)
- GetCommandLineW (Address: 0x180114ca0)
- GetComputerNameExW (Address: 0x180114ca8)
- GetConsoleMode (Address: 0x180114cb0)
- GetConsoleOutputCP (Address: 0x180114cb8)
- GetCPInfo (Address: 0x180114c90)
- GetCurrentDirectoryW (Address: 0x180114cc0)
- GetCurrentProcess (Address: 0x180114cc8)
- GetCurrentProcessId (Address: 0x180114cd0)
- GetCurrentThread (Address: 0x180114cd8)
- GetCurrentThreadId (Address: 0x180114ce0)
- GetDateFormatW (Address: 0x180114ce8)
- GetDriveTypeW (Address: 0x180114cf0)
- GetEnvironmentStringsW (Address: 0x180114cf8)
- GetEnvironmentVariableW (Address: 0x180114d00)
- GetFileAttributesW (Address: 0x180114d08)
- GetFileInformationByHandle (Address: 0x180114d10)
- GetFileSizeEx (Address: 0x180114d18)
- GetFileTime (Address: 0x180114d20)
- GetFileType (Address: 0x180114d28)
- GetFullPathNameW (Address: 0x180114d30)
- GetLastError (Address: 0x180114d38)
- GetLocaleInfoW (Address: 0x180114d48)
- GetLocalTime (Address: 0x180114d40)
- GetLongPathNameW (Address: 0x180114d50)
- GetModuleFileNameW (Address: 0x180114d58)
- GetModuleHandleA (Address: 0x180114d60)
- GetModuleHandleExW (Address: 0x180114d68)
- GetModuleHandleW (Address: 0x180114d70)
- GetNativeSystemInfo (Address: 0x180114d78)
- GetOEMCP (Address: 0x180114d80)
- GetProcAddress (Address: 0x180114d88)
- GetProcessHeap (Address: 0x180114d90)
- GetProcessId (Address: 0x180114d98)
- GetProductInfo (Address: 0x180114da0)
- GetStartupInfoW (Address: 0x180114da8)
- GetStdHandle (Address: 0x180114db0)
- GetStringTypeW (Address: 0x180114db8)
- GetSystemDirectoryW (Address: 0x180114dc0)
- GetSystemInfo (Address: 0x180114dc8)
- GetSystemTimeAsFileTime (Address: 0x180114dd0)
- GetTempPathW (Address: 0x180114dd8)
- GetThreadPriority (Address: 0x180114de0)
- GetTickCount (Address: 0x180114de8)
- GetTimeFormatW (Address: 0x180114df0)
- GetTimeZoneInformation (Address: 0x180114df8)
- GetUserDefaultLCID (Address: 0x180114e00)
- GetVersionExW (Address: 0x180114e08)
- GetWindowsDirectoryW (Address: 0x180114e10)
- InitializeCriticalSection (Address: 0x180114e20)
- InitializeCriticalSectionAndSpinCount (Address: 0x180114e28)
- InitializeSListHead (Address: 0x180114e30)
- InitOnceExecuteOnce (Address: 0x180114e18)
- InterlockedFlushSList (Address: 0x180114e38)
- IsDebuggerPresent (Address: 0x180114e40)
- IsProcessorFeaturePresent (Address: 0x180114e48)
- IsValidCodePage (Address: 0x180114e50)
- IsValidLocale (Address: 0x180114e58)
- IsWow64Process (Address: 0x180114e60)
- K32GetMappedFileNameW (Address: 0x180114e68)
- LCMapStringW (Address: 0x180114e70)
- LeaveCriticalSection (Address: 0x180114e78)
- LoadLibraryExA (Address: 0x180114e80)
- LoadLibraryExW (Address: 0x180114e88)
- LoadLibraryW (Address: 0x180114e90)
- LocalFree (Address: 0x180114e98)
- LockFileEx (Address: 0x180114ea0)
- lstrcmpiA (Address: 0x1801150c0)
- lstrlenA (Address: 0x1801150c8)
- MultiByteToWideChar (Address: 0x180114ea8)
- OpenProcess (Address: 0x180114eb0)
- OutputDebugStringA (Address: 0x180114eb8)
- OutputDebugStringW (Address: 0x180114ec0)
- PeekNamedPipe (Address: 0x180114ec8)
- QueryPerformanceCounter (Address: 0x180114ed0)
- QueryPerformanceFrequency (Address: 0x180114ed8)
- QueryThreadCycleTime (Address: 0x180114ee0)
- RaiseException (Address: 0x180114ee8)
- ReadConsoleW (Address: 0x180114ef0)
- ReadFile (Address: 0x180114ef8)
- ReadProcessMemory (Address: 0x180114f00)
- ReleaseMutex (Address: 0x180114f08)
- ReleaseSRWLockExclusive (Address: 0x180114f10)
- RemoveDirectoryW (Address: 0x180114f18)
- RemoveVectoredExceptionHandler (Address: 0x180114f20)
- RtlCaptureContext (Address: 0x180114f28)
- RtlCaptureStackBackTrace (Address: 0x180114f30)
- RtlLookupFunctionEntry (Address: 0x180114f38)
- RtlPcToFileHeader (Address: 0x180114f40)
- RtlUnwind (Address: 0x180114f48)
- RtlUnwindEx (Address: 0x180114f50)
- RtlVirtualUnwind (Address: 0x180114f58)
- SetConsoleCtrlHandler (Address: 0x180114f60)
- SetEndOfFile (Address: 0x180114f68)
- SetEnvironmentVariableW (Address: 0x180114f70)
- SetEvent (Address: 0x180114f78)
- SetFilePointerEx (Address: 0x180114f80)
- SetLastError (Address: 0x180114f88)
- SetNamedPipeHandleState (Address: 0x180114f90)
- SetProcessMitigationPolicy (Address: 0x180114f98)
- SetStdHandle (Address: 0x180114fa0)
- SetThreadInformation (Address: 0x180114fa8)
- SetThreadPriority (Address: 0x180114fb0)
- SetUnhandledExceptionFilter (Address: 0x180114fb8)
- Sleep (Address: 0x180114fc0)
- SleepConditionVariableSRW (Address: 0x180114fc8)
- SleepEx (Address: 0x180114fd0)
- SwitchToThread (Address: 0x180114fd8)
- SystemTimeToTzSpecificLocalTime (Address: 0x180114fe0)
- TerminateProcess (Address: 0x180114fe8)
- TlsAlloc (Address: 0x180114ff0)
- TlsFree (Address: 0x180114ff8)
- TlsGetValue (Address: 0x180115000)
- TlsSetValue (Address: 0x180115008)
- TransactNamedPipe (Address: 0x180115010)
- TryAcquireSRWLockExclusive (Address: 0x180115018)
- UnhandledExceptionFilter (Address: 0x180115020)
- UnlockFileEx (Address: 0x180115028)
- UnmapViewOfFile (Address: 0x180115030)
- UnregisterWaitEx (Address: 0x180115038)
- VerifyVersionInfoW (Address: 0x180115048)
- VerSetConditionMask (Address: 0x180115040)
- VirtualAlloc (Address: 0x180115050)
- VirtualFree (Address: 0x180115058)
- VirtualProtect (Address: 0x180115060)
- VirtualProtectEx (Address: 0x180115068)
- VirtualQuery (Address: 0x180115070)
- WaitForSingleObject (Address: 0x180115078)
- WaitNamedPipeW (Address: 0x180115080)
- WakeAllConditionVariable (Address: 0x180115088)
- WakeConditionVariable (Address: 0x180115090)
- WerRegisterRuntimeExceptionModule (Address: 0x180115098)
- WideCharToMultiByte (Address: 0x1801150a0)
- WriteConsoleW (Address: 0x1801150a8)
- WriteFile (Address: 0x1801150b0)
- WriteProcessMemory (Address: 0x1801150b8)
ntdll.dll
- NtClose (Address: 0x1801150d8)
- NtCreateKey (Address: 0x1801150e0)
- NtDeleteKey (Address: 0x1801150e8)
- NtOpenKeyEx (Address: 0x1801150f0)
- NtQueryValueKey (Address: 0x1801150f8)
- NtSetValueKey (Address: 0x180115100)
- RtlFormatCurrentUserKeyPath (Address: 0x180115108)
- RtlFreeUnicodeString (Address: 0x180115110)
- RtlInitUnicodeString (Address: 0x180115118)