kbaseconfigcenter64.dll
Description:
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23125
Architecture: 64-bit
Operating System: Windows NT
SHA256: 4058121c5af1a01984730e38baec8722
File Size: 925.5 KB
Uploaded At: Dec. 4, 2025, 6:11 a.m.
Views: 3
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- boolValue (Ordinal: 1, Address: 0x25d40)
- enable (Ordinal: 2, Address: 0x25d90)
- filter (Ordinal: 3, Address: 0x25dc0)
- getOemIniValid (Ordinal: 4, Address: 0x25df0)
- getProductDatValid (Ordinal: 5, Address: 0x25e50)
- initEntCloudConfigPath (Ordinal: 6, Address: 0x25e70)
- initLanguage (Ordinal: 7, Address: 0x25e90)
- initPath (Ordinal: 8, Address: 0x25eb0)
- intValue (Ordinal: 9, Address: 0x25ee0)
- support (Ordinal: 10, Address: 0x25f30)
- value (Ordinal: 11, Address: 0x25f60)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1800a0330)
- AcquireSRWLockShared (Address: 0x1800a0338)
- AreFileApisANSI (Address: 0x1800a0360)
- CloseHandle (Address: 0x1800a0258)
- CreateEventW (Address: 0x1800a0308)
- CreateFileW (Address: 0x1800a0250)
- CreateToolhelp32Snapshot (Address: 0x1800a02b0)
- DecodePointer (Address: 0x1800a0270)
- DeleteCriticalSection (Address: 0x1800a00a8)
- DeleteFileW (Address: 0x1800a0268)
- EncodePointer (Address: 0x1800a00f0)
- EnterCriticalSection (Address: 0x1800a0098)
- EnumSystemLocalesW (Address: 0x1800a01d0)
- ExitProcess (Address: 0x1800a0110)
- FindClose (Address: 0x1800a0148)
- FindFirstFileExW (Address: 0x1800a0150)
- FindNextFileW (Address: 0x1800a0158)
- FlushFileBuffers (Address: 0x1800a0210)
- FormatMessageA (Address: 0x1800a0358)
- FreeEnvironmentStringsW (Address: 0x1800a01a8)
- FreeLibrary (Address: 0x1800a00d8)
- GetACP (Address: 0x1800a0168)
- GetCommandLineA (Address: 0x1800a0180)
- GetCommandLineW (Address: 0x1800a0188)
- GetConsoleCP (Address: 0x1800a0220)
- GetConsoleMode (Address: 0x1800a0228)
- GetCPInfo (Address: 0x1800a0178)
- GetCurrentProcess (Address: 0x1800a0108)
- GetCurrentProcessId (Address: 0x1800a0008)
- GetCurrentThread (Address: 0x1800a0130)
- GetCurrentThreadId (Address: 0x1800a0010)
- GetEnvironmentStringsW (Address: 0x1800a01a0)
- GetFileAttributesExW (Address: 0x1800a0310)
- GetFileInformationByHandleEx (Address: 0x1800a0368)
- GetFileType (Address: 0x1800a01e8)
- GetLastError (Address: 0x1800a0088)
- GetLocaleInfoW (Address: 0x1800a01b8)
- GetModuleFileNameW (Address: 0x1800a0128)
- GetModuleHandleExW (Address: 0x1800a0120)
- GetModuleHandleW (Address: 0x1800a0068)
- GetOEMCP (Address: 0x1800a0170)
- GetPrivateProfileIntW (Address: 0x1800a0298)
- GetPrivateProfileStringW (Address: 0x1800a02a0)
- GetProcAddress (Address: 0x1800a00e0)
- GetProcessHeap (Address: 0x1800a01d8)
- GetStartupInfoW (Address: 0x1800a0058)
- GetStdHandle (Address: 0x1800a01e0)
- GetStringTypeW (Address: 0x1800a01f0)
- GetSystemDirectoryW (Address: 0x1800a0288)
- GetSystemInfo (Address: 0x1800a02d0)
- GetSystemTimeAsFileTime (Address: 0x1800a0018)
- GetUserDefaultLCID (Address: 0x1800a01c8)
- GetUserDefaultUILanguage (Address: 0x1800a02a8)
- HeapAlloc (Address: 0x1800a0138)
- HeapFree (Address: 0x1800a0140)
- HeapReAlloc (Address: 0x1800a0200)
- HeapSize (Address: 0x1800a01f8)
- InitializeCriticalSectionAndSpinCount (Address: 0x1800a00b0)
- InitializeCriticalSectionEx (Address: 0x1800a0370)
- InitializeSListHead (Address: 0x1800a0020)
- InitOnceBeginInitialize (Address: 0x1800a0340)
- InitOnceComplete (Address: 0x1800a0348)
- InterlockedFlushSList (Address: 0x1800a0080)
- InterlockedPushEntrySList (Address: 0x1800a0078)
- IsDebuggerPresent (Address: 0x1800a0040)
- IsProcessorFeaturePresent (Address: 0x1800a0060)
- IsValidCodePage (Address: 0x1800a0160)
- IsValidLocale (Address: 0x1800a01c0)
- LCMapStringEx (Address: 0x1800a0378)
- LCMapStringW (Address: 0x1800a01b0)
- LeaveCriticalSection (Address: 0x1800a00a0)
- LoadLibraryExA (Address: 0x1800a02e8)
- LoadLibraryExW (Address: 0x1800a00e8)
- LoadLibraryW (Address: 0x1800a0290)
- LocalFree (Address: 0x1800a0350)
- MultiByteToWideChar (Address: 0x1800a0190)
- OpenProcess (Address: 0x1800a0280)
- OutputDebugStringW (Address: 0x1800a0248)
- Process32FirstW (Address: 0x1800a02b8)
- Process32NextW (Address: 0x1800a02c0)
- ProcessIdToSessionId (Address: 0x1800a0278)
- QueryPerformanceCounter (Address: 0x1800a0000)
- QueryPerformanceFrequency (Address: 0x1800a02c8)
- RaiseException (Address: 0x1800a00f8)
- ReadConsoleW (Address: 0x1800a0240)
- ReadFile (Address: 0x1800a0238)
- ReleaseSRWLockExclusive (Address: 0x1800a0320)
- ReleaseSRWLockShared (Address: 0x1800a0328)
- ResetEvent (Address: 0x1800a02f8)
- RtlCaptureContext (Address: 0x1800a0028)
- RtlLookupFunctionEntry (Address: 0x1800a0030)
- RtlPcToFileHeader (Address: 0x1800a0100)
- RtlUnwindEx (Address: 0x1800a0070)
- RtlVirtualUnwind (Address: 0x1800a0038)
- SetEndOfFile (Address: 0x1800a0318)
- SetEvent (Address: 0x1800a02f0)
- SetFilePointerEx (Address: 0x1800a0230)
- SetLastError (Address: 0x1800a0090)
- SetStdHandle (Address: 0x1800a0208)
- SetUnhandledExceptionFilter (Address: 0x1800a0050)
- TerminateProcess (Address: 0x1800a0118)
- TlsAlloc (Address: 0x1800a00b8)
- TlsFree (Address: 0x1800a00d0)
- TlsGetValue (Address: 0x1800a00c0)
- TlsSetValue (Address: 0x1800a00c8)
- UnhandledExceptionFilter (Address: 0x1800a0048)
- VirtualProtect (Address: 0x1800a02d8)
- VirtualQuery (Address: 0x1800a02e0)
- WaitForSingleObjectEx (Address: 0x1800a0300)
- WideCharToMultiByte (Address: 0x1800a0198)
- WriteConsoleW (Address: 0x1800a0260)
- WriteFile (Address: 0x1800a0218)