kdesktopshellext.dll

Description: wpsdesktop shellext

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23125

Architecture: 32-bit

Operating System: Windows NT

SHA256: 01ca73eae598cc7011a13fc2434ae96c

File Size: 962.0 KB

Uploaded At: Dec. 4, 2025, 6:11 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x22a0)
  • DllGetClassObject (Ordinal: 2, Address: 0x2320)
  • DllInstall (Ordinal: 3, Address: 0x24c0)
  • DllRegisterServer (Ordinal: 4, Address: 0x24f0)
  • DllUnregisterServer (Ordinal: 5, Address: 0x2da0)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x100b1154)
  • AreFileApisANSI (Address: 0x100b1170)
  • CloseHandle (Address: 0x100b1054)
  • CompareFileTime (Address: 0x100b10c8)
  • CompareStringEx (Address: 0x100b1184)
  • CompareStringW (Address: 0x100b11f0)
  • CreateDirectoryW (Address: 0x100b10cc)
  • CreateEventW (Address: 0x100b119c)
  • CreateFileW (Address: 0x100b10d0)
  • CreateToolhelp32Snapshot (Address: 0x100b1110)
  • DecodePointer (Address: 0x100b1000)
  • DeleteCriticalSection (Address: 0x100b1010)
  • DeleteFileW (Address: 0x100b10c4)
  • DisableThreadLibraryCalls (Address: 0x100b1014)
  • EncodePointer (Address: 0x100b101c)
  • EnterCriticalSection (Address: 0x100b1038)
  • EnumSystemLocalesW (Address: 0x100b1204)
  • ExitProcess (Address: 0x100b11d8)
  • ExpandEnvironmentStringsW (Address: 0x100b10f4)
  • FindClose (Address: 0x100b10d4)
  • FindFirstFileExW (Address: 0x100b1168)
  • FindNextFileW (Address: 0x100b10d8)
  • FindResourceExW (Address: 0x100b1060)
  • FindResourceW (Address: 0x100b107c)
  • FlushFileBuffers (Address: 0x100b1210)
  • FormatMessageA (Address: 0x100b1148)
  • FreeEnvironmentStringsW (Address: 0x100b1230)
  • FreeLibrary (Address: 0x100b1064)
  • FreeResource (Address: 0x100b1068)
  • GetACP (Address: 0x100b1220)
  • GetCommandLineA (Address: 0x100b1228)
  • GetCommandLineW (Address: 0x100b109c)
  • GetConsoleCP (Address: 0x100b1214)
  • GetConsoleMode (Address: 0x100b1208)
  • GetCPInfo (Address: 0x100b1188)
  • GetCurrentProcess (Address: 0x100b10fc)
  • GetCurrentProcessId (Address: 0x100b1100)
  • GetCurrentThread (Address: 0x100b1104)
  • GetCurrentThreadId (Address: 0x100b1160)
  • GetDateFormatW (Address: 0x100b11e8)
  • GetEnvironmentStringsW (Address: 0x100b122c)
  • GetFileAttributesExW (Address: 0x100b1050)
  • GetFileAttributesW (Address: 0x100b10a0)
  • GetFileInformationByHandleEx (Address: 0x100b1174)
  • GetFileSizeEx (Address: 0x100b10dc)
  • GetFileType (Address: 0x100b11e4)
  • GetLastError (Address: 0x100b1008)
  • GetLocaleInfoEx (Address: 0x100b1180)
  • GetLocaleInfoW (Address: 0x100b11f8)
  • GetLongPathNameW (Address: 0x100b1120)
  • GetModuleFileNameW (Address: 0x100b1040)
  • GetModuleHandleExW (Address: 0x100b11dc)
  • GetModuleHandleW (Address: 0x100b1044)
  • GetOEMCP (Address: 0x100b1224)
  • GetPrivateProfileIntW (Address: 0x100b10b0)
  • GetPrivateProfileStringW (Address: 0x100b10b4)
  • GetProcAddress (Address: 0x100b1048)
  • GetProcessHeap (Address: 0x100b1034)
  • GetStartupInfoW (Address: 0x100b11b4)
  • GetStdHandle (Address: 0x100b11e0)
  • GetStringTypeW (Address: 0x100b1164)
  • GetSystemDirectoryW (Address: 0x100b105c)
  • GetSystemInfo (Address: 0x100b1134)
  • GetSystemTime (Address: 0x100b10ec)
  • GetSystemTimeAsFileTime (Address: 0x100b1178)
  • GetSystemWow64DirectoryW (Address: 0x100b10a4)
  • GetTimeFormatW (Address: 0x100b11ec)
  • GetTimeZoneInformation (Address: 0x100b1218)
  • GetUserDefaultLCID (Address: 0x100b1200)
  • GetUserDefaultUILanguage (Address: 0x100b10bc)
  • GlobalAlloc (Address: 0x100b1080)
  • GlobalFree (Address: 0x100b108c)
  • GlobalLock (Address: 0x100b1088)
  • GlobalUnlock (Address: 0x100b1084)
  • HeapAlloc (Address: 0x100b1024)
  • HeapDestroy (Address: 0x100b1020)
  • HeapFree (Address: 0x100b102c)
  • HeapReAlloc (Address: 0x100b1028)
  • HeapSize (Address: 0x100b1030)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100b100c)
  • InitializeCriticalSectionEx (Address: 0x100b1158)
  • InitializeSListHead (Address: 0x100b11b0)
  • InitializeSRWLock (Address: 0x100b114c)
  • InterlockedFlushSList (Address: 0x100b11c0)
  • InterlockedPushEntrySList (Address: 0x100b11bc)
  • IsDebuggerPresent (Address: 0x100b118c)
  • IsProcessorFeaturePresent (Address: 0x100b11ac)
  • IsValidCodePage (Address: 0x100b121c)
  • IsValidLocale (Address: 0x100b11fc)
  • LCMapStringEx (Address: 0x100b117c)
  • LCMapStringW (Address: 0x100b11f4)
  • LeaveCriticalSection (Address: 0x100b103c)
  • LoadLibraryExA (Address: 0x100b1140)
  • LoadLibraryExW (Address: 0x100b106c)
  • LoadLibraryW (Address: 0x100b10a8)
  • LoadResource (Address: 0x100b1070)
  • LocalFree (Address: 0x100b1144)
  • LockResource (Address: 0x100b1074)
  • lstrcmpiW (Address: 0x100b1090)
  • lstrlenW (Address: 0x100b10ac)
  • MultiByteToWideChar (Address: 0x100b1098)
  • OpenMutexW (Address: 0x100b1058)
  • OpenProcess (Address: 0x100b110c)
  • OutputDebugStringA (Address: 0x100b1124)
  • OutputDebugStringW (Address: 0x100b1018)
  • Process32FirstW (Address: 0x100b1114)
  • Process32NextW (Address: 0x100b1118)
  • ProcessIdToSessionId (Address: 0x100b1108)
  • QueryPerformanceCounter (Address: 0x100b1128)
  • QueryPerformanceFrequency (Address: 0x100b112c)
  • RaiseException (Address: 0x100b1004)
  • ReadConsoleW (Address: 0x100b120c)
  • ReadFile (Address: 0x100b10e0)
  • ReleaseSRWLockExclusive (Address: 0x100b1150)
  • ResetEvent (Address: 0x100b1194)
  • RtlUnwind (Address: 0x100b11b8)
  • SetEndOfFile (Address: 0x100b116c)
  • SetEnvironmentVariableW (Address: 0x100b10c0)
  • SetEvent (Address: 0x100b1190)
  • SetFilePointerEx (Address: 0x100b10e4)
  • SetLastError (Address: 0x100b111c)
  • SetStdHandle (Address: 0x100b1130)
  • SetUnhandledExceptionFilter (Address: 0x100b11a4)
  • SizeofResource (Address: 0x100b1078)
  • Sleep (Address: 0x100b10f8)
  • SystemTimeToFileTime (Address: 0x100b10f0)
  • TerminateProcess (Address: 0x100b11a8)
  • TlsAlloc (Address: 0x100b11c4)
  • TlsFree (Address: 0x100b11d0)
  • TlsGetValue (Address: 0x100b11c8)
  • TlsSetValue (Address: 0x100b11cc)
  • TryEnterCriticalSection (Address: 0x100b115c)
  • UnhandledExceptionFilter (Address: 0x100b11a0)
  • VerifyVersionInfoW (Address: 0x100b1094)
  • VerSetConditionMask (Address: 0x100b104c)
  • VirtualAlloc (Address: 0x100b11d4)
  • VirtualProtect (Address: 0x100b1138)
  • VirtualQuery (Address: 0x100b113c)
  • WaitForSingleObjectEx (Address: 0x100b1198)
  • WideCharToMultiByte (Address: 0x100b10b8)
  • WriteConsoleW (Address: 0x100b1234)
  • WriteFile (Address: 0x100b10e8)