qingshellext.dll
Description: qingbangong shellext
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23125
Architecture: 32-bit
Operating System: Windows NT
SHA256: 94fe1dfc09a6b1fd07a145300cd9859e
File Size: 722.0 KB
Uploaded At: Dec. 4, 2025, 6:11 a.m.
Views: 3
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x3400)
- DllGetClassObject (Ordinal: 2, Address: 0x3470)
- DllInstall (Ordinal: 3, Address: 0x3610)
- DllRegisterServer (Ordinal: 4, Address: 0x3640)
- DllUnregisterServer (Ordinal: 5, Address: 0x3d70)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1007c1a4)
- AreFileApisANSI (Address: 0x1007c1c0)
- CloseHandle (Address: 0x1007c06c)
- CreateEventW (Address: 0x1007c0c8)
- CreateFileA (Address: 0x1007c174)
- CreateFileMappingW (Address: 0x1007c124)
- CreateFileW (Address: 0x1007c060)
- CreateMutexW (Address: 0x1007c11c)
- CreateThread (Address: 0x1007c178)
- CreateToolhelp32Snapshot (Address: 0x1007c10c)
- DecodePointer (Address: 0x1007c000)
- DeleteCriticalSection (Address: 0x1007c010)
- DeleteFileW (Address: 0x1007c08c)
- DeviceIoControl (Address: 0x1007c100)
- DisableThreadLibraryCalls (Address: 0x1007c014)
- EncodePointer (Address: 0x1007c01c)
- EnterCriticalSection (Address: 0x1007c038)
- EnumSystemLocalesW (Address: 0x1007c238)
- ExitProcess (Address: 0x1007c21c)
- ExitThread (Address: 0x1007c210)
- ExpandEnvironmentStringsW (Address: 0x1007c154)
- FindClose (Address: 0x1007c090)
- FindFirstFileExW (Address: 0x1007c1b0)
- FindFirstFileW (Address: 0x1007c094)
- FindNextFileW (Address: 0x1007c098)
- FindResourceExW (Address: 0x1007c040)
- FindResourceW (Address: 0x1007c05c)
- FlushFileBuffers (Address: 0x1007c244)
- FormatMessageA (Address: 0x1007c194)
- FreeEnvironmentStringsW (Address: 0x1007c264)
- FreeLibrary (Address: 0x1007c080)
- FreeLibraryAndExitThread (Address: 0x1007c214)
- FreeResource (Address: 0x1007c0ec)
- GetACP (Address: 0x1007c254)
- GetCommandLineA (Address: 0x1007c25c)
- GetCommandLineW (Address: 0x1007c134)
- GetConsoleCP (Address: 0x1007c248)
- GetConsoleMode (Address: 0x1007c23c)
- GetCPInfo (Address: 0x1007c1d0)
- GetCurrentProcess (Address: 0x1007c158)
- GetCurrentProcessId (Address: 0x1007c15c)
- GetCurrentThread (Address: 0x1007c160)
- GetCurrentThreadId (Address: 0x1007c0d0)
- GetDriveTypeW (Address: 0x1007c0fc)
- GetEnvironmentStringsW (Address: 0x1007c260)
- GetEnvironmentVariableW (Address: 0x1007c14c)
- GetFileAttributesExW (Address: 0x1007c1b4)
- GetFileAttributesW (Address: 0x1007c0e4)
- GetFileInformationByHandleEx (Address: 0x1007c1c4)
- GetFileSizeEx (Address: 0x1007c24c)
- GetFileType (Address: 0x1007c224)
- GetLastError (Address: 0x1007c008)
- GetLocaleInfoW (Address: 0x1007c22c)
- GetLongPathNameW (Address: 0x1007c170)
- GetModuleFileNameW (Address: 0x1007c044)
- GetModuleHandleExW (Address: 0x1007c104)
- GetModuleHandleW (Address: 0x1007c048)
- GetOEMCP (Address: 0x1007c258)
- GetPrivateProfileIntW (Address: 0x1007c140)
- GetPrivateProfileStringW (Address: 0x1007c144)
- GetProcAddress (Address: 0x1007c04c)
- GetProcessHeap (Address: 0x1007c034)
- GetProcessId (Address: 0x1007c0b0)
- GetStartupInfoW (Address: 0x1007c1f4)
- GetStdHandle (Address: 0x1007c220)
- GetStringTypeW (Address: 0x1007c198)
- GetSystemDirectoryW (Address: 0x1007c138)
- GetSystemInfo (Address: 0x1007c188)
- GetSystemTimeAsFileTime (Address: 0x1007c1cc)
- GetSystemWow64DirectoryW (Address: 0x1007c0d4)
- GetTempFileNameW (Address: 0x1007c09c)
- GetTempPathW (Address: 0x1007c0a8)
- GetUserDefaultLCID (Address: 0x1007c234)
- GetUserDefaultUILanguage (Address: 0x1007c148)
- GlobalAlloc (Address: 0x1007c0f0)
- GlobalFree (Address: 0x1007c0f4)
- GlobalLock (Address: 0x1007c0dc)
- GlobalUnlock (Address: 0x1007c0d8)
- HeapAlloc (Address: 0x1007c024)
- HeapDestroy (Address: 0x1007c020)
- HeapFree (Address: 0x1007c02c)
- HeapReAlloc (Address: 0x1007c028)
- HeapSize (Address: 0x1007c030)
- InitializeCriticalSection (Address: 0x1007c0bc)
- InitializeCriticalSectionAndSpinCount (Address: 0x1007c00c)
- InitializeCriticalSectionEx (Address: 0x1007c1a8)
- InitializeSListHead (Address: 0x1007c1f0)
- InitializeSRWLock (Address: 0x1007c19c)
- InterlockedFlushSList (Address: 0x1007c1fc)
- IsDebuggerPresent (Address: 0x1007c1d4)
- IsProcessorFeaturePresent (Address: 0x1007c1ec)
- IsValidCodePage (Address: 0x1007c250)
- IsValidLocale (Address: 0x1007c230)
- LCMapStringEx (Address: 0x1007c1c8)
- LCMapStringW (Address: 0x1007c228)
- LeaveCriticalSection (Address: 0x1007c03c)
- LoadLibraryExA (Address: 0x1007c190)
- LoadLibraryExW (Address: 0x1007c084)
- LoadLibraryW (Address: 0x1007c108)
- LoadResource (Address: 0x1007c050)
- LocalFree (Address: 0x1007c0b4)
- LockResource (Address: 0x1007c054)
- lstrcmpiW (Address: 0x1007c088)
- lstrlenW (Address: 0x1007c13c)
- MapViewOfFile (Address: 0x1007c12c)
- MulDiv (Address: 0x1007c0f8)
- MultiByteToWideChar (Address: 0x1007c078)
- OpenFileMappingW (Address: 0x1007c128)
- OpenMutexW (Address: 0x1007c0ac)
- OpenProcess (Address: 0x1007c168)
- OutputDebugStringW (Address: 0x1007c018)
- Process32FirstW (Address: 0x1007c110)
- Process32NextW (Address: 0x1007c114)
- ProcessIdToSessionId (Address: 0x1007c164)
- QueryPerformanceCounter (Address: 0x1007c17c)
- QueryPerformanceFrequency (Address: 0x1007c180)
- RaiseException (Address: 0x1007c004)
- ReadConsoleW (Address: 0x1007c240)
- ReadFile (Address: 0x1007c064)
- ReleaseMutex (Address: 0x1007c118)
- ReleaseSRWLockExclusive (Address: 0x1007c1a0)
- ResetEvent (Address: 0x1007c1d8)
- RtlUnwind (Address: 0x1007c1f8)
- SetEndOfFile (Address: 0x1007c1b8)
- SetEnvironmentVariableW (Address: 0x1007c150)
- SetEvent (Address: 0x1007c0c0)
- SetFileAttributesW (Address: 0x1007c0a0)
- SetFilePointer (Address: 0x1007c0a4)
- SetFilePointerEx (Address: 0x1007c1bc)
- SetLastError (Address: 0x1007c16c)
- SetNamedPipeHandleState (Address: 0x1007c070)
- SetStdHandle (Address: 0x1007c184)
- SetUnhandledExceptionFilter (Address: 0x1007c1e4)
- SizeofResource (Address: 0x1007c058)
- Sleep (Address: 0x1007c0b8)
- TerminateProcess (Address: 0x1007c1e8)
- TerminateThread (Address: 0x1007c0cc)
- TlsAlloc (Address: 0x1007c200)
- TlsFree (Address: 0x1007c20c)
- TlsGetValue (Address: 0x1007c204)
- TlsSetValue (Address: 0x1007c208)
- TryEnterCriticalSection (Address: 0x1007c1ac)
- UnhandledExceptionFilter (Address: 0x1007c1e0)
- UnmapViewOfFile (Address: 0x1007c130)
- VerifyVersionInfoW (Address: 0x1007c0e8)
- VerSetConditionMask (Address: 0x1007c0e0)
- VirtualAlloc (Address: 0x1007c218)
- VirtualProtect (Address: 0x1007c18c)
- VirtualQuery (Address: 0x1007c120)
- WaitForSingleObject (Address: 0x1007c0c4)
- WaitForSingleObjectEx (Address: 0x1007c1dc)
- WaitNamedPipeW (Address: 0x1007c074)
- WideCharToMultiByte (Address: 0x1007c07c)
- WriteConsoleW (Address: 0x1007c268)
- WriteFile (Address: 0x1007c068)