kyunhook.dll
Description: kyunhook
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23125
Architecture: 32-bit
Operating System: Windows NT
SHA256: e8b848d5cdf638a83a4a7b7757d986ea
File Size: 687.0 KB
Uploaded At: Dec. 4, 2025, 6:12 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x1490)
- DllGetClassObject (Ordinal: 2, Address: 0x14a0)
- DllMain (Ordinal: 3, Address: 0x1520)
- DllRegisterServer (Ordinal: 4, Address: 0x19c0)
- DllUnregisterServer (Ordinal: 5, Address: 0x1b50)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x10081148)
- CloseHandle (Address: 0x10081028)
- CompareStringEx (Address: 0x10081198)
- CompareStringW (Address: 0x10081210)
- CreateDirectoryW (Address: 0x10081044)
- CreateEventW (Address: 0x100811a8)
- CreateFileMappingW (Address: 0x1008109c)
- CreateFileW (Address: 0x10081048)
- CreateMutexW (Address: 0x10081084)
- CreateThread (Address: 0x100811f0)
- CreateToolhelp32Snapshot (Address: 0x100810e0)
- DecodePointer (Address: 0x100810f0)
- DeleteCriticalSection (Address: 0x100810fc)
- DeleteFileW (Address: 0x1008104c)
- DisableThreadLibraryCalls (Address: 0x10081004)
- EncodePointer (Address: 0x10081188)
- EnterCriticalSection (Address: 0x1008114c)
- EnumSystemLocalesW (Address: 0x10081224)
- ExitProcess (Address: 0x10081200)
- ExitThread (Address: 0x100811f4)
- ExpandEnvironmentStringsW (Address: 0x10081020)
- FileTimeToSystemTime (Address: 0x10081130)
- FindClose (Address: 0x10081050)
- FindFirstFileExW (Address: 0x10081180)
- FindFirstFileW (Address: 0x10081054)
- FindNextFileW (Address: 0x10081058)
- FlushFileBuffers (Address: 0x1008122c)
- FlushInstructionCache (Address: 0x10081110)
- FreeEnvironmentStringsW (Address: 0x10081260)
- FreeLibrary (Address: 0x100810cc)
- FreeLibraryAndExitThread (Address: 0x100811f8)
- GetACP (Address: 0x10081250)
- GetCommandLineA (Address: 0x10081258)
- GetCommandLineW (Address: 0x10081040)
- GetConsoleCP (Address: 0x10081230)
- GetConsoleMode (Address: 0x10081234)
- GetCPInfo (Address: 0x1008119c)
- GetCurrentDirectoryW (Address: 0x1008117c)
- GetCurrentProcess (Address: 0x100810d4)
- GetCurrentProcessId (Address: 0x1008108c)
- GetCurrentThread (Address: 0x1008100c)
- GetCurrentThreadId (Address: 0x10081090)
- GetDateFormatW (Address: 0x10081208)
- GetDiskFreeSpaceExW (Address: 0x1008105c)
- GetDriveTypeW (Address: 0x100811e0)
- GetEnvironmentStringsW (Address: 0x1008125c)
- GetExitCodeThread (Address: 0x100810bc)
- GetFileAttributesW (Address: 0x10081060)
- GetFileInformationByHandle (Address: 0x10081124)
- GetFileSize (Address: 0x10081128)
- GetFileSizeEx (Address: 0x10081238)
- GetFileType (Address: 0x100811e4)
- GetFullPathNameW (Address: 0x10081024)
- GetLastError (Address: 0x10081000)
- GetLocaleInfoEx (Address: 0x10081194)
- GetLocaleInfoW (Address: 0x10081218)
- GetLocalTime (Address: 0x100810b8)
- GetModuleFileNameW (Address: 0x10081008)
- GetModuleHandleExW (Address: 0x100811fc)
- GetModuleHandleW (Address: 0x10081010)
- GetOEMCP (Address: 0x10081254)
- GetProcAddress (Address: 0x10081014)
- GetProcessHeap (Address: 0x10081034)
- GetStartupInfoW (Address: 0x100811c0)
- GetStdHandle (Address: 0x10081204)
- GetStringTypeW (Address: 0x10081178)
- GetSystemDirectoryW (Address: 0x100810c4)
- GetSystemInfo (Address: 0x1008113c)
- GetSystemTimeAsFileTime (Address: 0x10081190)
- GetSystemWow64DirectoryW (Address: 0x100810c8)
- GetThreadContext (Address: 0x10081108)
- GetTickCount (Address: 0x1008112c)
- GetTimeFormatW (Address: 0x1008120c)
- GetTimeZoneInformation (Address: 0x10081240)
- GetUserDefaultLCID (Address: 0x10081220)
- HeapAlloc (Address: 0x1008102c)
- HeapFree (Address: 0x10081030)
- HeapReAlloc (Address: 0x10081248)
- HeapSize (Address: 0x10081138)
- InitializeConditionVariable (Address: 0x10081164)
- InitializeCriticalSectionAndSpinCount (Address: 0x100810f8)
- InitializeCriticalSectionEx (Address: 0x10081154)
- InitializeSListHead (Address: 0x100811c4)
- InitializeSRWLock (Address: 0x10081140)
- InterlockedFlushSList (Address: 0x100811cc)
- IsDebuggerPresent (Address: 0x100811bc)
- IsProcessorFeaturePresent (Address: 0x100811b8)
- IsValidCodePage (Address: 0x1008124c)
- IsValidLocale (Address: 0x1008121c)
- LCMapStringEx (Address: 0x1008118c)
- LCMapStringW (Address: 0x10081214)
- LeaveCriticalSection (Address: 0x10081150)
- LoadLibraryExA (Address: 0x1008111c)
- LoadLibraryExW (Address: 0x10081120)
- LoadLibraryW (Address: 0x10081018)
- lstrlenW (Address: 0x10081038)
- MapViewOfFile (Address: 0x100810a4)
- MapViewOfFileEx (Address: 0x100810a8)
- MoveFileW (Address: 0x100810b0)
- MultiByteToWideChar (Address: 0x100810b4)
- OpenFileMappingW (Address: 0x100810a0)
- OpenProcess (Address: 0x100810dc)
- OutputDebugStringW (Address: 0x10081078)
- PeekNamedPipe (Address: 0x100811e8)
- Process32FirstW (Address: 0x100810e4)
- Process32NextW (Address: 0x100810e8)
- ProcessIdToSessionId (Address: 0x100810d8)
- QueryPerformanceCounter (Address: 0x1008115c)
- RaiseException (Address: 0x100810f4)
- ReadConsoleW (Address: 0x1008123c)
- ReadFile (Address: 0x10081064)
- ReleaseMutex (Address: 0x1008107c)
- ReleaseSRWLockExclusive (Address: 0x10081144)
- RemoveDirectoryW (Address: 0x10081068)
- ResetEvent (Address: 0x100811a4)
- ResumeThread (Address: 0x10081104)
- RtlCaptureStackBackTrace (Address: 0x1008101c)
- RtlUnwind (Address: 0x100811c8)
- SetEndOfFile (Address: 0x1008106c)
- SetEnvironmentVariableW (Address: 0x10081244)
- SetEvent (Address: 0x100811a0)
- SetFilePointer (Address: 0x10081070)
- SetFilePointerEx (Address: 0x10081184)
- SetLastError (Address: 0x100810ec)
- SetStdHandle (Address: 0x10081228)
- SetThreadContext (Address: 0x1008110c)
- SetUnhandledExceptionFilter (Address: 0x100811b0)
- Sleep (Address: 0x10081088)
- SleepConditionVariableCS (Address: 0x10081170)
- SleepConditionVariableSRW (Address: 0x10081174)
- SuspendThread (Address: 0x10081100)
- SystemTimeToFileTime (Address: 0x10081134)
- SystemTimeToTzSpecificLocalTime (Address: 0x100811ec)
- TerminateProcess (Address: 0x100811b4)
- TlsAlloc (Address: 0x100811d0)
- TlsFree (Address: 0x100811dc)
- TlsGetValue (Address: 0x100811d4)
- TlsSetValue (Address: 0x100811d8)
- TryEnterCriticalSection (Address: 0x10081158)
- UnhandledExceptionFilter (Address: 0x100811ac)
- UnmapViewOfFile (Address: 0x100810ac)
- VerifyVersionInfoW (Address: 0x100810d0)
- VerSetConditionMask (Address: 0x100810c0)
- VirtualAlloc (Address: 0x10081094)
- VirtualFree (Address: 0x10081098)
- VirtualProtect (Address: 0x10081114)
- VirtualQuery (Address: 0x10081118)
- WaitForSingleObject (Address: 0x10081080)
- WaitForSingleObjectEx (Address: 0x10081160)
- WakeAllConditionVariable (Address: 0x1008116c)
- WakeConditionVariable (Address: 0x10081168)
- WideCharToMultiByte (Address: 0x1008103c)
- WriteConsoleW (Address: 0x10081264)
- WriteFile (Address: 0x10081074)