qingshellext64.dll

Description: qingbangong shellext64

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23125

Architecture: 64-bit

Operating System: Windows NT

SHA256: a234a6d217abbde62691b9d5e7b0b0e3

File Size: 839.5 KB

Uploaded At: Dec. 4, 2025, 6:11 a.m.

Views: 3

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x33b0)
  • DllGetClassObject (Ordinal: 2, Address: 0x3430)
  • DllInstall (Ordinal: 3, Address: 0x35e0)
  • DllRegisterServer (Ordinal: 4, Address: 0x3620)
  • DllUnregisterServer (Ordinal: 5, Address: 0x41f0)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18008b348)
  • AreFileApisANSI (Address: 0x18008b380)
  • CloseHandle (Address: 0x18008b0d8)
  • CreateEventW (Address: 0x18008b190)
  • CreateFileA (Address: 0x18008b2e8)
  • CreateFileMappingW (Address: 0x18008b248)
  • CreateFileW (Address: 0x18008b0c0)
  • CreateMutexW (Address: 0x18008b238)
  • CreateThread (Address: 0x18008b2f0)
  • CreateToolhelp32Snapshot (Address: 0x18008b218)
  • DecodePointer (Address: 0x18008b000)
  • DeleteCriticalSection (Address: 0x18008b020)
  • DeleteFileW (Address: 0x18008b118)
  • DeviceIoControl (Address: 0x18008b200)
  • DisableThreadLibraryCalls (Address: 0x18008b028)
  • EncodePointer (Address: 0x18008b038)
  • EnterCriticalSection (Address: 0x18008b070)
  • EnumSystemLocalesW (Address: 0x18008b490)
  • ExitProcess (Address: 0x18008b458)
  • ExitThread (Address: 0x18008b440)
  • ExpandEnvironmentStringsW (Address: 0x18008b2a8)
  • FindClose (Address: 0x18008b120)
  • FindFirstFileExW (Address: 0x18008b360)
  • FindFirstFileW (Address: 0x18008b128)
  • FindNextFileW (Address: 0x18008b130)
  • FindResourceExW (Address: 0x18008b080)
  • FindResourceW (Address: 0x18008b0b8)
  • FlushFileBuffers (Address: 0x18008b4a8)
  • FormatMessageA (Address: 0x18008b328)
  • FreeEnvironmentStringsW (Address: 0x18008b4e8)
  • FreeLibrary (Address: 0x18008b100)
  • FreeLibraryAndExitThread (Address: 0x18008b448)
  • FreeResource (Address: 0x18008b1d8)
  • GetACP (Address: 0x18008b4c8)
  • GetCommandLineA (Address: 0x18008b4d8)
  • GetCommandLineW (Address: 0x18008b268)
  • GetConsoleCP (Address: 0x18008b4b0)
  • GetConsoleMode (Address: 0x18008b498)
  • GetCPInfo (Address: 0x18008b3a0)
  • GetCurrentProcess (Address: 0x18008b2b0)
  • GetCurrentProcessId (Address: 0x18008b2b8)
  • GetCurrentThread (Address: 0x18008b2c0)
  • GetCurrentThreadId (Address: 0x18008b1a0)
  • GetDriveTypeW (Address: 0x18008b1f8)
  • GetEnvironmentStringsW (Address: 0x18008b4e0)
  • GetEnvironmentVariableW (Address: 0x18008b298)
  • GetFileAttributesExW (Address: 0x18008b368)
  • GetFileAttributesW (Address: 0x18008b1c8)
  • GetFileInformationByHandleEx (Address: 0x18008b388)
  • GetFileSizeEx (Address: 0x18008b4b8)
  • GetFileType (Address: 0x18008b468)
  • GetLastError (Address: 0x18008b010)
  • GetLocaleInfoW (Address: 0x18008b478)
  • GetLongPathNameW (Address: 0x18008b2e0)
  • GetModuleFileNameW (Address: 0x18008b088)
  • GetModuleHandleExW (Address: 0x18008b208)
  • GetModuleHandleW (Address: 0x18008b090)
  • GetOEMCP (Address: 0x18008b4d0)
  • GetPrivateProfileIntW (Address: 0x18008b280)
  • GetPrivateProfileStringW (Address: 0x18008b288)
  • GetProcAddress (Address: 0x18008b098)
  • GetProcessHeap (Address: 0x18008b068)
  • GetProcessId (Address: 0x18008b160)
  • GetStartupInfoW (Address: 0x18008b400)
  • GetStdHandle (Address: 0x18008b460)
  • GetStringTypeW (Address: 0x18008b330)
  • GetSystemDirectoryW (Address: 0x18008b270)
  • GetSystemInfo (Address: 0x18008b310)
  • GetSystemTimeAsFileTime (Address: 0x18008b398)
  • GetSystemWow64DirectoryW (Address: 0x18008b1a8)
  • GetTempFileNameW (Address: 0x18008b138)
  • GetTempPathW (Address: 0x18008b150)
  • GetUserDefaultLCID (Address: 0x18008b488)
  • GetUserDefaultUILanguage (Address: 0x18008b290)
  • GlobalAlloc (Address: 0x18008b1e0)
  • GlobalFree (Address: 0x18008b1e8)
  • GlobalLock (Address: 0x18008b1b8)
  • GlobalUnlock (Address: 0x18008b1b0)
  • HeapAlloc (Address: 0x18008b048)
  • HeapDestroy (Address: 0x18008b040)
  • HeapFree (Address: 0x18008b058)
  • HeapReAlloc (Address: 0x18008b050)
  • HeapSize (Address: 0x18008b060)
  • InitializeCriticalSection (Address: 0x18008b178)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18008b018)
  • InitializeCriticalSectionEx (Address: 0x18008b350)
  • InitializeSListHead (Address: 0x18008b3f8)
  • InitializeSRWLock (Address: 0x18008b338)
  • InterlockedFlushSList (Address: 0x18008b418)
  • IsDebuggerPresent (Address: 0x18008b3a8)
  • IsProcessorFeaturePresent (Address: 0x18008b3f0)
  • IsValidCodePage (Address: 0x18008b4c0)
  • IsValidLocale (Address: 0x18008b480)
  • LCMapStringEx (Address: 0x18008b390)
  • LCMapStringW (Address: 0x18008b470)
  • LeaveCriticalSection (Address: 0x18008b078)
  • LoadLibraryExA (Address: 0x18008b320)
  • LoadLibraryExW (Address: 0x18008b108)
  • LoadLibraryW (Address: 0x18008b210)
  • LoadResource (Address: 0x18008b0a0)
  • LocalFree (Address: 0x18008b168)
  • LockResource (Address: 0x18008b0a8)
  • lstrcmpiW (Address: 0x18008b110)
  • lstrlenW (Address: 0x18008b278)
  • MapViewOfFile (Address: 0x18008b258)
  • MulDiv (Address: 0x18008b1f0)
  • MultiByteToWideChar (Address: 0x18008b0f0)
  • OpenFileMappingW (Address: 0x18008b250)
  • OpenMutexW (Address: 0x18008b158)
  • OpenProcess (Address: 0x18008b2d0)
  • OutputDebugStringW (Address: 0x18008b030)
  • Process32FirstW (Address: 0x18008b220)
  • Process32NextW (Address: 0x18008b228)
  • ProcessIdToSessionId (Address: 0x18008b2c8)
  • QueryPerformanceCounter (Address: 0x18008b2f8)
  • QueryPerformanceFrequency (Address: 0x18008b300)
  • RaiseException (Address: 0x18008b008)
  • ReadConsoleW (Address: 0x18008b4a0)
  • ReadFile (Address: 0x18008b0c8)
  • ReleaseMutex (Address: 0x18008b230)
  • ReleaseSRWLockExclusive (Address: 0x18008b340)
  • ResetEvent (Address: 0x18008b3b0)
  • RtlCaptureContext (Address: 0x18008b3c0)
  • RtlLookupFunctionEntry (Address: 0x18008b3c8)
  • RtlPcToFileHeader (Address: 0x18008b410)
  • RtlUnwind (Address: 0x18008b4f8)
  • RtlUnwindEx (Address: 0x18008b408)
  • RtlVirtualUnwind (Address: 0x18008b3d0)
  • SetEndOfFile (Address: 0x18008b370)
  • SetEnvironmentVariableW (Address: 0x18008b2a0)
  • SetEvent (Address: 0x18008b180)
  • SetFileAttributesW (Address: 0x18008b140)
  • SetFilePointer (Address: 0x18008b148)
  • SetFilePointerEx (Address: 0x18008b378)
  • SetLastError (Address: 0x18008b2d8)
  • SetNamedPipeHandleState (Address: 0x18008b0e0)
  • SetStdHandle (Address: 0x18008b4f0)
  • SetUnhandledExceptionFilter (Address: 0x18008b3e0)
  • SizeofResource (Address: 0x18008b0b0)
  • Sleep (Address: 0x18008b170)
  • TerminateProcess (Address: 0x18008b3e8)
  • TerminateThread (Address: 0x18008b198)
  • TlsAlloc (Address: 0x18008b420)
  • TlsFree (Address: 0x18008b438)
  • TlsGetValue (Address: 0x18008b428)
  • TlsSetValue (Address: 0x18008b430)
  • TryEnterCriticalSection (Address: 0x18008b358)
  • UnhandledExceptionFilter (Address: 0x18008b3d8)
  • UnmapViewOfFile (Address: 0x18008b260)
  • VerifyVersionInfoW (Address: 0x18008b1d0)
  • VerSetConditionMask (Address: 0x18008b1c0)
  • VirtualAlloc (Address: 0x18008b450)
  • VirtualProtect (Address: 0x18008b318)
  • VirtualQuery (Address: 0x18008b240)
  • WaitForSingleObject (Address: 0x18008b188)
  • WaitForSingleObjectEx (Address: 0x18008b3b8)
  • WaitNamedPipeW (Address: 0x18008b0e8)
  • WideCharToMultiByte (Address: 0x18008b0f8)
  • WriteConsoleW (Address: 0x18008b308)
  • WriteFile (Address: 0x18008b0d0)