kbaseconfigcenter64.dll

Description:

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23125

Architecture: 64-bit

Operating System: Windows NT

SHA256: 4058121c5af1a01984730e38baec8722

File Size: 925.5 KB

Uploaded At: Dec. 4, 2025, 6:11 a.m.

Views: 3

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • boolValue (Ordinal: 1, Address: 0x25d40)
  • enable (Ordinal: 2, Address: 0x25d90)
  • filter (Ordinal: 3, Address: 0x25dc0)
  • getOemIniValid (Ordinal: 4, Address: 0x25df0)
  • getProductDatValid (Ordinal: 5, Address: 0x25e50)
  • initEntCloudConfigPath (Ordinal: 6, Address: 0x25e70)
  • initLanguage (Ordinal: 7, Address: 0x25e90)
  • initPath (Ordinal: 8, Address: 0x25eb0)
  • intValue (Ordinal: 9, Address: 0x25ee0)
  • support (Ordinal: 10, Address: 0x25f30)
  • value (Ordinal: 11, Address: 0x25f60)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1800a0330)
  • AcquireSRWLockShared (Address: 0x1800a0338)
  • AreFileApisANSI (Address: 0x1800a0360)
  • CloseHandle (Address: 0x1800a0258)
  • CreateEventW (Address: 0x1800a0308)
  • CreateFileW (Address: 0x1800a0250)
  • CreateToolhelp32Snapshot (Address: 0x1800a02b0)
  • DecodePointer (Address: 0x1800a0270)
  • DeleteCriticalSection (Address: 0x1800a00a8)
  • DeleteFileW (Address: 0x1800a0268)
  • EncodePointer (Address: 0x1800a00f0)
  • EnterCriticalSection (Address: 0x1800a0098)
  • EnumSystemLocalesW (Address: 0x1800a01d0)
  • ExitProcess (Address: 0x1800a0110)
  • FindClose (Address: 0x1800a0148)
  • FindFirstFileExW (Address: 0x1800a0150)
  • FindNextFileW (Address: 0x1800a0158)
  • FlushFileBuffers (Address: 0x1800a0210)
  • FormatMessageA (Address: 0x1800a0358)
  • FreeEnvironmentStringsW (Address: 0x1800a01a8)
  • FreeLibrary (Address: 0x1800a00d8)
  • GetACP (Address: 0x1800a0168)
  • GetCommandLineA (Address: 0x1800a0180)
  • GetCommandLineW (Address: 0x1800a0188)
  • GetConsoleCP (Address: 0x1800a0220)
  • GetConsoleMode (Address: 0x1800a0228)
  • GetCPInfo (Address: 0x1800a0178)
  • GetCurrentProcess (Address: 0x1800a0108)
  • GetCurrentProcessId (Address: 0x1800a0008)
  • GetCurrentThread (Address: 0x1800a0130)
  • GetCurrentThreadId (Address: 0x1800a0010)
  • GetEnvironmentStringsW (Address: 0x1800a01a0)
  • GetFileAttributesExW (Address: 0x1800a0310)
  • GetFileInformationByHandleEx (Address: 0x1800a0368)
  • GetFileType (Address: 0x1800a01e8)
  • GetLastError (Address: 0x1800a0088)
  • GetLocaleInfoW (Address: 0x1800a01b8)
  • GetModuleFileNameW (Address: 0x1800a0128)
  • GetModuleHandleExW (Address: 0x1800a0120)
  • GetModuleHandleW (Address: 0x1800a0068)
  • GetOEMCP (Address: 0x1800a0170)
  • GetPrivateProfileIntW (Address: 0x1800a0298)
  • GetPrivateProfileStringW (Address: 0x1800a02a0)
  • GetProcAddress (Address: 0x1800a00e0)
  • GetProcessHeap (Address: 0x1800a01d8)
  • GetStartupInfoW (Address: 0x1800a0058)
  • GetStdHandle (Address: 0x1800a01e0)
  • GetStringTypeW (Address: 0x1800a01f0)
  • GetSystemDirectoryW (Address: 0x1800a0288)
  • GetSystemInfo (Address: 0x1800a02d0)
  • GetSystemTimeAsFileTime (Address: 0x1800a0018)
  • GetUserDefaultLCID (Address: 0x1800a01c8)
  • GetUserDefaultUILanguage (Address: 0x1800a02a8)
  • HeapAlloc (Address: 0x1800a0138)
  • HeapFree (Address: 0x1800a0140)
  • HeapReAlloc (Address: 0x1800a0200)
  • HeapSize (Address: 0x1800a01f8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800a00b0)
  • InitializeCriticalSectionEx (Address: 0x1800a0370)
  • InitializeSListHead (Address: 0x1800a0020)
  • InitOnceBeginInitialize (Address: 0x1800a0340)
  • InitOnceComplete (Address: 0x1800a0348)
  • InterlockedFlushSList (Address: 0x1800a0080)
  • InterlockedPushEntrySList (Address: 0x1800a0078)
  • IsDebuggerPresent (Address: 0x1800a0040)
  • IsProcessorFeaturePresent (Address: 0x1800a0060)
  • IsValidCodePage (Address: 0x1800a0160)
  • IsValidLocale (Address: 0x1800a01c0)
  • LCMapStringEx (Address: 0x1800a0378)
  • LCMapStringW (Address: 0x1800a01b0)
  • LeaveCriticalSection (Address: 0x1800a00a0)
  • LoadLibraryExA (Address: 0x1800a02e8)
  • LoadLibraryExW (Address: 0x1800a00e8)
  • LoadLibraryW (Address: 0x1800a0290)
  • LocalFree (Address: 0x1800a0350)
  • MultiByteToWideChar (Address: 0x1800a0190)
  • OpenProcess (Address: 0x1800a0280)
  • OutputDebugStringW (Address: 0x1800a0248)
  • Process32FirstW (Address: 0x1800a02b8)
  • Process32NextW (Address: 0x1800a02c0)
  • ProcessIdToSessionId (Address: 0x1800a0278)
  • QueryPerformanceCounter (Address: 0x1800a0000)
  • QueryPerformanceFrequency (Address: 0x1800a02c8)
  • RaiseException (Address: 0x1800a00f8)
  • ReadConsoleW (Address: 0x1800a0240)
  • ReadFile (Address: 0x1800a0238)
  • ReleaseSRWLockExclusive (Address: 0x1800a0320)
  • ReleaseSRWLockShared (Address: 0x1800a0328)
  • ResetEvent (Address: 0x1800a02f8)
  • RtlCaptureContext (Address: 0x1800a0028)
  • RtlLookupFunctionEntry (Address: 0x1800a0030)
  • RtlPcToFileHeader (Address: 0x1800a0100)
  • RtlUnwindEx (Address: 0x1800a0070)
  • RtlVirtualUnwind (Address: 0x1800a0038)
  • SetEndOfFile (Address: 0x1800a0318)
  • SetEvent (Address: 0x1800a02f0)
  • SetFilePointerEx (Address: 0x1800a0230)
  • SetLastError (Address: 0x1800a0090)
  • SetStdHandle (Address: 0x1800a0208)
  • SetUnhandledExceptionFilter (Address: 0x1800a0050)
  • TerminateProcess (Address: 0x1800a0118)
  • TlsAlloc (Address: 0x1800a00b8)
  • TlsFree (Address: 0x1800a00d0)
  • TlsGetValue (Address: 0x1800a00c0)
  • TlsSetValue (Address: 0x1800a00c8)
  • UnhandledExceptionFilter (Address: 0x1800a0048)
  • VirtualProtect (Address: 0x1800a02d8)
  • VirtualQuery (Address: 0x1800a02e0)
  • WaitForSingleObjectEx (Address: 0x1800a0300)
  • WideCharToMultiByte (Address: 0x1800a0198)
  • WriteConsoleW (Address: 0x1800a0260)
  • WriteFile (Address: 0x1800a0218)