CSERHelper.dll
Description: Debug Helper Routines
Authors: Copyright (c) Valve Corporation
Version: 4.50.0.0
Architecture: 32-bit
Operating System: Windows
SHA256: 09d4c2067217b1900d4d7a936969f809
File Size: 121.5 KB
Uploaded At: Dec. 4, 2025, 6:19 a.m.
Views: 19
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- AddClientDV (Ordinal: 1, Address: 0x619d)
- GetSuperAssertionCount (Ordinal: 2, Address: 0x702c)
- MemStressInitializeA (Ordinal: 3, Address: 0x61a5)
- MemStressInitializeW (Ordinal: 4, Address: 0x61a5)
- MemStressTerminate (Ordinal: 5, Address: 0x61ab)
- SuperAssertionA (Ordinal: 6, Address: 0x6ede)
- SuperAssertionW (Ordinal: 7, Address: 0x6ff5)
- ValidateAllBlocks (Ordinal: 8, Address: 0x61a2)
- AddCrashHandlerLimitModule (Ordinal: 9, Address: 0x3bd5)
- AddDiagAssertModule (Ordinal: 10, Address: 0x4cc7)
- AllocAndFillProcessModuleList (Ordinal: 11, Address: 0x1000)
- BSUAnsi2Wide (Ordinal: 12, Address: 0x39f6)
- BSUGetModuleBaseNameA (Ordinal: 13, Address: 0x3709)
- BSUGetModuleBaseNameW (Ordinal: 14, Address: 0x3766)
- BSUGetModuleFileNameExA (Ordinal: 15, Address: 0x3941)
- BSUGetModuleFileNameExW (Ordinal: 16, Address: 0x39a4)
- BSUIsInteractiveUser (Ordinal: 17, Address: 0x3a16)
- BSUSetCurrentThreadNameA (Ordinal: 18, Address: 0x3b02)
- BSUSetCurrentThreadNameW (Ordinal: 19, Address: 0x3af4)
- BSUSetThreadNameA (Ordinal: 20, Address: 0x3aa6)
- BSUSetThreadNameW (Ordinal: 21, Address: 0x3a5b)
- BSUSymInitializeA (Ordinal: 22, Address: 0x3802)
- BSUSymInitializeW (Ordinal: 23, Address: 0x376b)
- BSUWide2Ansi (Ordinal: 24, Address: 0x39d3)
- CreateCurrentProcessCrashDumpA (Ordinal: 25, Address: 0x6219)
- CreateCurrentProcessCrashDumpW (Ordinal: 26, Address: 0x6295)
- DiagAssertA (Ordinal: 27, Address: 0x4cde)
- DiagAssertW (Ordinal: 28, Address: 0x4d41)
- DiagOutputA (Ordinal: 29, Address: 0x4fba)
- DiagOutputW (Ordinal: 30, Address: 0x503d)
- GetFaultReason (Ordinal: 31, Address: 0x3dc2)
- GetFirstStackTraceString (Ordinal: 32, Address: 0x4195)
- GetLimitModuleCount (Ordinal: 33, Address: 0x3c57)
- GetLimitModulesArray (Ordinal: 34, Address: 0x3c5d)
- GetLoadedModules (Ordinal: 35, Address: 0x5a31)
- GetNextStackTraceString (Ordinal: 36, Address: 0x41d2)
- GetProcessThreadIds (Ordinal: 37, Address: 0x5aa5)
- GetRegisterString (Ordinal: 38, Address: 0x48e2)
- HookImportedFunctionsByNameA (Ordinal: 39, Address: 0x5b60)
- HookImportedFunctionsByNameW (Ordinal: 40, Address: 0x5b00)
- HookOrdinalExportA (Ordinal: 41, Address: 0x5df9)
- HookOrdinalExportW (Ordinal: 42, Address: 0x5dac)
- IsMiniDumpFunctionAvailable (Ordinal: 43, Address: 0x61af)
- IsNT4 (Ordinal: 44, Address: 0x6063)
- IsNT (Ordinal: 45, Address: 0x6048)
- IsServer2003 (Ordinal: 46, Address: 0x60e8)
- IsServer2003orBetter (Ordinal: 47, Address: 0x616d)
- IsW2K (Ordinal: 48, Address: 0x608a)
- IsW2KorBetter (Ordinal: 49, Address: 0x6118)
- IsXP (Ordinal: 50, Address: 0x60ba)
- IsXPorBetter (Ordinal: 51, Address: 0x613f)
- SetCrashHandlerFilter (Ordinal: 52, Address: 0x3b51)
- SetDiagAssertFile (Ordinal: 53, Address: 0x4caf)
- SetDiagAssertOptions (Ordinal: 54, Address: 0x4c8f)
- SetDiagOutputFile (Ordinal: 55, Address: 0x4fa8)
- SnapCurrentProcessMiniDumpA (Ordinal: 56, Address: 0x6461)
- SnapCurrentProcessMiniDumpW (Ordinal: 57, Address: 0x6663)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x60014014)
- RegCreateKeyExW (Address: 0x60014004)
- RegCreateKeyW (Address: 0x60014010)
- RegOpenKeyExW (Address: 0x60014000)
- RegQueryValueExW (Address: 0x60014008)
- RegSetValueExW (Address: 0x6001400c)
DBGHELP.dll
- StackWalk64 (Address: 0x60014048)
- SymCleanup (Address: 0x60014040)
- SymFunctionTableAccess64 (Address: 0x60014050)
- SymGetLineFromAddr64 (Address: 0x60014030)
- SymGetModuleBase64 (Address: 0x60014038)
- SymGetModuleInfo64 (Address: 0x6001402c)
- SymGetOptions (Address: 0x60014024)
- SymGetSymFromAddr (Address: 0x60014020)
- SymGetSymFromAddr64 (Address: 0x60014034)
- SymInitialize (Address: 0x60014044)
- SymLoadModule (Address: 0x6001403c)
- SymLoadModule64 (Address: 0x60014028)
- SymSetOptions (Address: 0x6001401c)
- UnDecorateSymbolName (Address: 0x6001404c)
KERNEL32.dll
- CloseHandle (Address: 0x600140fc)
- CreateFileA (Address: 0x60014080)
- CreateFileW (Address: 0x600140f8)
- DeleteCriticalSection (Address: 0x600140c0)
- DisableThreadLibraryCalls (Address: 0x600140e4)
- EnterCriticalSection (Address: 0x600140c4)
- ExitProcess (Address: 0x600140d4)
- FindResourceExW (Address: 0x6001412c)
- FlushFileBuffers (Address: 0x600141fc)
- FormatMessageW (Address: 0x600140a0)
- FreeEnvironmentStringsA (Address: 0x600141ac)
- FreeEnvironmentStringsW (Address: 0x600141b4)
- FreeLibrary (Address: 0x6001411c)
- GetACP (Address: 0x60014088)
- GetCommandLineA (Address: 0x6001416c)
- GetCPInfo (Address: 0x600141d4)
- GetCurrentProcess (Address: 0x600140b4)
- GetCurrentProcessId (Address: 0x6001414c)
- GetCurrentThread (Address: 0x600140b8)
- GetCurrentThreadId (Address: 0x60014100)
- GetEnvironmentStrings (Address: 0x600141b0)
- GetEnvironmentStringsW (Address: 0x600141b8)
- GetFileType (Address: 0x600141a4)
- GetLastError (Address: 0x60014144)
- GetLocaleInfoA (Address: 0x600141dc)
- GetLocaleInfoW (Address: 0x60014128)
- GetModuleFileNameA (Address: 0x6001407c)
- GetModuleFileNameW (Address: 0x600140cc)
- GetModuleHandleA (Address: 0x60014184)
- GetModuleHandleW (Address: 0x60014090)
- GetOEMCP (Address: 0x600141d0)
- GetProcAddress (Address: 0x60014074)
- GetProcessHeap (Address: 0x60014138)
- GetProfileIntW (Address: 0x60014068)
- GetStartupInfoA (Address: 0x600141a8)
- GetStdHandle (Address: 0x600141a0)
- GetStringTypeA (Address: 0x600141e0)
- GetStringTypeW (Address: 0x600141e4)
- GetSystemInfo (Address: 0x600141bc)
- GetSystemTimeAsFileTime (Address: 0x600141f8)
- GetThreadContext (Address: 0x60014058)
- GetThreadPriority (Address: 0x60014108)
- GetTickCount (Address: 0x600141f4)
- GetVersionExA (Address: 0x60014170)
- GetVersionExW (Address: 0x600140e0)
- GlobalAlloc (Address: 0x600140b0)
- GlobalFree (Address: 0x60014160)
- GlobalLock (Address: 0x60014120)
- GlobalUnlock (Address: 0x60014124)
- HeapAlloc (Address: 0x60014148)
- HeapCreate (Address: 0x60014178)
- HeapDestroy (Address: 0x60014174)
- HeapFree (Address: 0x6001413c)
- HeapReAlloc (Address: 0x60014164)
- HeapSize (Address: 0x6001418c)
- InitializeCriticalSection (Address: 0x600141c8)
- InitializeCriticalSectionAndSpinCount (Address: 0x600140bc)
- InterlockedExchange (Address: 0x60014154)
- IsBadCodePtr (Address: 0x60014098)
- IsBadReadPtr (Address: 0x6001409c)
- IsBadStringPtrA (Address: 0x600140f0)
- IsBadStringPtrW (Address: 0x600140f4)
- IsBadWritePtr (Address: 0x6001415c)
- IsDebuggerPresent (Address: 0x60014064)
- LCMapStringA (Address: 0x600141c0)
- LCMapStringW (Address: 0x600141c4)
- LeaveCriticalSection (Address: 0x600140c8)
- LoadLibraryA (Address: 0x600141d8)
- LoadLibraryW (Address: 0x60014070)
- LoadResource (Address: 0x60014130)
- LocalAlloc (Address: 0x60014158)
- LocalFree (Address: 0x600140d0)
- LockResource (Address: 0x60014134)
- lstrcpynW (Address: 0x600140a8)
- lstrlenA (Address: 0x600140a4)
- lstrlenW (Address: 0x60014140)
- MultiByteToWideChar (Address: 0x60014078)
- OpenProcess (Address: 0x60014104)
- OpenThread (Address: 0x60014110)
- OutputDebugStringA (Address: 0x600140d8)
- OutputDebugStringW (Address: 0x6001405c)
- QueryPerformanceCounter (Address: 0x600141f0)
- RaiseException (Address: 0x6001408c)
- ReadProcessMemory (Address: 0x600140ac)
- ResumeThread (Address: 0x60014118)
- RtlUnwind (Address: 0x600141e8)
- SearchPathW (Address: 0x6001406c)
- SetFilePointer (Address: 0x600141cc)
- SetHandleCount (Address: 0x6001419c)
- SetLastError (Address: 0x60014150)
- SetStdHandle (Address: 0x600141ec)
- SetThreadPriority (Address: 0x6001410c)
- SetUnhandledExceptionFilter (Address: 0x60014094)
- SuspendThread (Address: 0x60014114)
- TerminateProcess (Address: 0x60014188)
- TlsAlloc (Address: 0x60014198)
- TlsFree (Address: 0x60014190)
- TlsGetValue (Address: 0x60014194)
- TlsSetValue (Address: 0x60014168)
- VirtualAlloc (Address: 0x60014180)
- VirtualFree (Address: 0x6001417c)
- VirtualProtect (Address: 0x600140ec)
- VirtualQuery (Address: 0x600140e8)
- VirtualQueryEx (Address: 0x600140dc)
- WideCharToMultiByte (Address: 0x60014084)
- WriteFile (Address: 0x60014060)