chrome_wer.dll
Description: Google Chrome
Authors: Copyright 2025 Google LLC. All rights reserved.
Version: 142.0.7444.176
Architecture: 64-bit
Operating System: Windows
SHA256: d1cf4cc6e73c9509e05f4e000e605bae
File Size: 118.6 KB
Uploaded At: Dec. 1, 2025, 2:50 p.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- OutOfProcessExceptionEventCallback (Ordinal: 1, Address: 0x1010)
- OutOfProcessExceptionEventDebuggerLaunchCallback (Ordinal: 2, Address: 0x1080)
- OutOfProcessExceptionEventSignatureCallback (Ordinal: 3, Address: 0x1080)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x1800185c8)
- CreateFileW (Address: 0x1800185d0)
- DeleteCriticalSection (Address: 0x1800185d8)
- DuplicateHandle (Address: 0x1800185e0)
- EncodePointer (Address: 0x1800185e8)
- EnterCriticalSection (Address: 0x1800185f0)
- ExitProcess (Address: 0x1800185f8)
- FindClose (Address: 0x180018600)
- FindFirstFileExW (Address: 0x180018608)
- FindNextFileW (Address: 0x180018610)
- FlsAlloc (Address: 0x180018618)
- FlsFree (Address: 0x180018620)
- FlsGetValue (Address: 0x180018628)
- FlsSetValue (Address: 0x180018630)
- FlushFileBuffers (Address: 0x180018638)
- FreeEnvironmentStringsW (Address: 0x180018640)
- FreeLibrary (Address: 0x180018648)
- GetACP (Address: 0x180018650)
- GetCommandLineA (Address: 0x180018660)
- GetCommandLineW (Address: 0x180018668)
- GetConsoleMode (Address: 0x180018670)
- GetConsoleOutputCP (Address: 0x180018678)
- GetCPInfo (Address: 0x180018658)
- GetCurrentProcess (Address: 0x180018680)
- GetCurrentProcessId (Address: 0x180018688)
- GetCurrentThreadId (Address: 0x180018690)
- GetEnvironmentStringsW (Address: 0x180018698)
- GetFileType (Address: 0x1800186a0)
- GetLastError (Address: 0x1800186a8)
- GetModuleFileNameW (Address: 0x1800186b0)
- GetModuleHandleExW (Address: 0x1800186b8)
- GetModuleHandleW (Address: 0x1800186c0)
- GetOEMCP (Address: 0x1800186c8)
- GetProcAddress (Address: 0x1800186d0)
- GetProcessHeap (Address: 0x1800186d8)
- GetStartupInfoW (Address: 0x1800186e0)
- GetStdHandle (Address: 0x1800186e8)
- GetStringTypeW (Address: 0x1800186f0)
- GetSystemTimeAsFileTime (Address: 0x1800186f8)
- GetThreadId (Address: 0x180018700)
- HeapAlloc (Address: 0x180018708)
- HeapFree (Address: 0x180018710)
- HeapReAlloc (Address: 0x180018718)
- HeapSize (Address: 0x180018720)
- InitializeCriticalSectionAndSpinCount (Address: 0x180018728)
- InitializeCriticalSectionEx (Address: 0x180018730)
- InitializeSListHead (Address: 0x180018738)
- InterlockedFlushSList (Address: 0x180018740)
- IsDebuggerPresent (Address: 0x180018748)
- IsProcessorFeaturePresent (Address: 0x180018750)
- IsValidCodePage (Address: 0x180018758)
- LCMapStringW (Address: 0x180018760)
- LeaveCriticalSection (Address: 0x180018768)
- LoadLibraryExW (Address: 0x180018770)
- MultiByteToWideChar (Address: 0x180018778)
- QueryPerformanceCounter (Address: 0x180018780)
- RaiseException (Address: 0x180018788)
- ReadProcessMemory (Address: 0x180018790)
- RtlCaptureContext (Address: 0x180018798)
- RtlLookupFunctionEntry (Address: 0x1800187a0)
- RtlPcToFileHeader (Address: 0x1800187a8)
- RtlUnwindEx (Address: 0x1800187b0)
- RtlVirtualUnwind (Address: 0x1800187b8)
- SetEvent (Address: 0x1800187c0)
- SetFilePointerEx (Address: 0x1800187c8)
- SetLastError (Address: 0x1800187d0)
- SetStdHandle (Address: 0x1800187d8)
- SetUnhandledExceptionFilter (Address: 0x1800187e0)
- TerminateProcess (Address: 0x1800187e8)
- TlsAlloc (Address: 0x1800187f0)
- TlsFree (Address: 0x1800187f8)
- TlsGetValue (Address: 0x180018800)
- TlsSetValue (Address: 0x180018808)
- UnhandledExceptionFilter (Address: 0x180018810)
- VirtualProtect (Address: 0x180018818)
- WaitForSingleObject (Address: 0x180018820)
- WideCharToMultiByte (Address: 0x180018828)
- WriteConsoleW (Address: 0x180018830)
- WriteFile (Address: 0x180018838)
- WriteProcessMemory (Address: 0x180018840)