kdesktopshellext.dll
Description: wpsdesktop shellext
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23125
Architecture: 32-bit
Operating System: Windows NT
SHA256: 01ca73eae598cc7011a13fc2434ae96c
File Size: 962.0 KB
Uploaded At: Dec. 4, 2025, 6:11 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x22a0)
- DllGetClassObject (Ordinal: 2, Address: 0x2320)
- DllInstall (Ordinal: 3, Address: 0x24c0)
- DllRegisterServer (Ordinal: 4, Address: 0x24f0)
- DllUnregisterServer (Ordinal: 5, Address: 0x2da0)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x100b1154)
- AreFileApisANSI (Address: 0x100b1170)
- CloseHandle (Address: 0x100b1054)
- CompareFileTime (Address: 0x100b10c8)
- CompareStringEx (Address: 0x100b1184)
- CompareStringW (Address: 0x100b11f0)
- CreateDirectoryW (Address: 0x100b10cc)
- CreateEventW (Address: 0x100b119c)
- CreateFileW (Address: 0x100b10d0)
- CreateToolhelp32Snapshot (Address: 0x100b1110)
- DecodePointer (Address: 0x100b1000)
- DeleteCriticalSection (Address: 0x100b1010)
- DeleteFileW (Address: 0x100b10c4)
- DisableThreadLibraryCalls (Address: 0x100b1014)
- EncodePointer (Address: 0x100b101c)
- EnterCriticalSection (Address: 0x100b1038)
- EnumSystemLocalesW (Address: 0x100b1204)
- ExitProcess (Address: 0x100b11d8)
- ExpandEnvironmentStringsW (Address: 0x100b10f4)
- FindClose (Address: 0x100b10d4)
- FindFirstFileExW (Address: 0x100b1168)
- FindNextFileW (Address: 0x100b10d8)
- FindResourceExW (Address: 0x100b1060)
- FindResourceW (Address: 0x100b107c)
- FlushFileBuffers (Address: 0x100b1210)
- FormatMessageA (Address: 0x100b1148)
- FreeEnvironmentStringsW (Address: 0x100b1230)
- FreeLibrary (Address: 0x100b1064)
- FreeResource (Address: 0x100b1068)
- GetACP (Address: 0x100b1220)
- GetCommandLineA (Address: 0x100b1228)
- GetCommandLineW (Address: 0x100b109c)
- GetConsoleCP (Address: 0x100b1214)
- GetConsoleMode (Address: 0x100b1208)
- GetCPInfo (Address: 0x100b1188)
- GetCurrentProcess (Address: 0x100b10fc)
- GetCurrentProcessId (Address: 0x100b1100)
- GetCurrentThread (Address: 0x100b1104)
- GetCurrentThreadId (Address: 0x100b1160)
- GetDateFormatW (Address: 0x100b11e8)
- GetEnvironmentStringsW (Address: 0x100b122c)
- GetFileAttributesExW (Address: 0x100b1050)
- GetFileAttributesW (Address: 0x100b10a0)
- GetFileInformationByHandleEx (Address: 0x100b1174)
- GetFileSizeEx (Address: 0x100b10dc)
- GetFileType (Address: 0x100b11e4)
- GetLastError (Address: 0x100b1008)
- GetLocaleInfoEx (Address: 0x100b1180)
- GetLocaleInfoW (Address: 0x100b11f8)
- GetLongPathNameW (Address: 0x100b1120)
- GetModuleFileNameW (Address: 0x100b1040)
- GetModuleHandleExW (Address: 0x100b11dc)
- GetModuleHandleW (Address: 0x100b1044)
- GetOEMCP (Address: 0x100b1224)
- GetPrivateProfileIntW (Address: 0x100b10b0)
- GetPrivateProfileStringW (Address: 0x100b10b4)
- GetProcAddress (Address: 0x100b1048)
- GetProcessHeap (Address: 0x100b1034)
- GetStartupInfoW (Address: 0x100b11b4)
- GetStdHandle (Address: 0x100b11e0)
- GetStringTypeW (Address: 0x100b1164)
- GetSystemDirectoryW (Address: 0x100b105c)
- GetSystemInfo (Address: 0x100b1134)
- GetSystemTime (Address: 0x100b10ec)
- GetSystemTimeAsFileTime (Address: 0x100b1178)
- GetSystemWow64DirectoryW (Address: 0x100b10a4)
- GetTimeFormatW (Address: 0x100b11ec)
- GetTimeZoneInformation (Address: 0x100b1218)
- GetUserDefaultLCID (Address: 0x100b1200)
- GetUserDefaultUILanguage (Address: 0x100b10bc)
- GlobalAlloc (Address: 0x100b1080)
- GlobalFree (Address: 0x100b108c)
- GlobalLock (Address: 0x100b1088)
- GlobalUnlock (Address: 0x100b1084)
- HeapAlloc (Address: 0x100b1024)
- HeapDestroy (Address: 0x100b1020)
- HeapFree (Address: 0x100b102c)
- HeapReAlloc (Address: 0x100b1028)
- HeapSize (Address: 0x100b1030)
- InitializeCriticalSectionAndSpinCount (Address: 0x100b100c)
- InitializeCriticalSectionEx (Address: 0x100b1158)
- InitializeSListHead (Address: 0x100b11b0)
- InitializeSRWLock (Address: 0x100b114c)
- InterlockedFlushSList (Address: 0x100b11c0)
- InterlockedPushEntrySList (Address: 0x100b11bc)
- IsDebuggerPresent (Address: 0x100b118c)
- IsProcessorFeaturePresent (Address: 0x100b11ac)
- IsValidCodePage (Address: 0x100b121c)
- IsValidLocale (Address: 0x100b11fc)
- LCMapStringEx (Address: 0x100b117c)
- LCMapStringW (Address: 0x100b11f4)
- LeaveCriticalSection (Address: 0x100b103c)
- LoadLibraryExA (Address: 0x100b1140)
- LoadLibraryExW (Address: 0x100b106c)
- LoadLibraryW (Address: 0x100b10a8)
- LoadResource (Address: 0x100b1070)
- LocalFree (Address: 0x100b1144)
- LockResource (Address: 0x100b1074)
- lstrcmpiW (Address: 0x100b1090)
- lstrlenW (Address: 0x100b10ac)
- MultiByteToWideChar (Address: 0x100b1098)
- OpenMutexW (Address: 0x100b1058)
- OpenProcess (Address: 0x100b110c)
- OutputDebugStringA (Address: 0x100b1124)
- OutputDebugStringW (Address: 0x100b1018)
- Process32FirstW (Address: 0x100b1114)
- Process32NextW (Address: 0x100b1118)
- ProcessIdToSessionId (Address: 0x100b1108)
- QueryPerformanceCounter (Address: 0x100b1128)
- QueryPerformanceFrequency (Address: 0x100b112c)
- RaiseException (Address: 0x100b1004)
- ReadConsoleW (Address: 0x100b120c)
- ReadFile (Address: 0x100b10e0)
- ReleaseSRWLockExclusive (Address: 0x100b1150)
- ResetEvent (Address: 0x100b1194)
- RtlUnwind (Address: 0x100b11b8)
- SetEndOfFile (Address: 0x100b116c)
- SetEnvironmentVariableW (Address: 0x100b10c0)
- SetEvent (Address: 0x100b1190)
- SetFilePointerEx (Address: 0x100b10e4)
- SetLastError (Address: 0x100b111c)
- SetStdHandle (Address: 0x100b1130)
- SetUnhandledExceptionFilter (Address: 0x100b11a4)
- SizeofResource (Address: 0x100b1078)
- Sleep (Address: 0x100b10f8)
- SystemTimeToFileTime (Address: 0x100b10f0)
- TerminateProcess (Address: 0x100b11a8)
- TlsAlloc (Address: 0x100b11c4)
- TlsFree (Address: 0x100b11d0)
- TlsGetValue (Address: 0x100b11c8)
- TlsSetValue (Address: 0x100b11cc)
- TryEnterCriticalSection (Address: 0x100b115c)
- UnhandledExceptionFilter (Address: 0x100b11a0)
- VerifyVersionInfoW (Address: 0x100b1094)
- VerSetConditionMask (Address: 0x100b104c)
- VirtualAlloc (Address: 0x100b11d4)
- VirtualProtect (Address: 0x100b1138)
- VirtualQuery (Address: 0x100b113c)
- WaitForSingleObjectEx (Address: 0x100b1198)
- WideCharToMultiByte (Address: 0x100b10b8)
- WriteConsoleW (Address: 0x100b1234)
- WriteFile (Address: 0x100b10e8)