kyunhook.dll

Description: kyunhook

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23125

Architecture: 32-bit

Operating System: Windows NT

SHA256: e8b848d5cdf638a83a4a7b7757d986ea

File Size: 687.0 KB

Uploaded At: Dec. 4, 2025, 6:12 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1490)
  • DllGetClassObject (Ordinal: 2, Address: 0x14a0)
  • DllMain (Ordinal: 3, Address: 0x1520)
  • DllRegisterServer (Ordinal: 4, Address: 0x19c0)
  • DllUnregisterServer (Ordinal: 5, Address: 0x1b50)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x10081148)
  • CloseHandle (Address: 0x10081028)
  • CompareStringEx (Address: 0x10081198)
  • CompareStringW (Address: 0x10081210)
  • CreateDirectoryW (Address: 0x10081044)
  • CreateEventW (Address: 0x100811a8)
  • CreateFileMappingW (Address: 0x1008109c)
  • CreateFileW (Address: 0x10081048)
  • CreateMutexW (Address: 0x10081084)
  • CreateThread (Address: 0x100811f0)
  • CreateToolhelp32Snapshot (Address: 0x100810e0)
  • DecodePointer (Address: 0x100810f0)
  • DeleteCriticalSection (Address: 0x100810fc)
  • DeleteFileW (Address: 0x1008104c)
  • DisableThreadLibraryCalls (Address: 0x10081004)
  • EncodePointer (Address: 0x10081188)
  • EnterCriticalSection (Address: 0x1008114c)
  • EnumSystemLocalesW (Address: 0x10081224)
  • ExitProcess (Address: 0x10081200)
  • ExitThread (Address: 0x100811f4)
  • ExpandEnvironmentStringsW (Address: 0x10081020)
  • FileTimeToSystemTime (Address: 0x10081130)
  • FindClose (Address: 0x10081050)
  • FindFirstFileExW (Address: 0x10081180)
  • FindFirstFileW (Address: 0x10081054)
  • FindNextFileW (Address: 0x10081058)
  • FlushFileBuffers (Address: 0x1008122c)
  • FlushInstructionCache (Address: 0x10081110)
  • FreeEnvironmentStringsW (Address: 0x10081260)
  • FreeLibrary (Address: 0x100810cc)
  • FreeLibraryAndExitThread (Address: 0x100811f8)
  • GetACP (Address: 0x10081250)
  • GetCommandLineA (Address: 0x10081258)
  • GetCommandLineW (Address: 0x10081040)
  • GetConsoleCP (Address: 0x10081230)
  • GetConsoleMode (Address: 0x10081234)
  • GetCPInfo (Address: 0x1008119c)
  • GetCurrentDirectoryW (Address: 0x1008117c)
  • GetCurrentProcess (Address: 0x100810d4)
  • GetCurrentProcessId (Address: 0x1008108c)
  • GetCurrentThread (Address: 0x1008100c)
  • GetCurrentThreadId (Address: 0x10081090)
  • GetDateFormatW (Address: 0x10081208)
  • GetDiskFreeSpaceExW (Address: 0x1008105c)
  • GetDriveTypeW (Address: 0x100811e0)
  • GetEnvironmentStringsW (Address: 0x1008125c)
  • GetExitCodeThread (Address: 0x100810bc)
  • GetFileAttributesW (Address: 0x10081060)
  • GetFileInformationByHandle (Address: 0x10081124)
  • GetFileSize (Address: 0x10081128)
  • GetFileSizeEx (Address: 0x10081238)
  • GetFileType (Address: 0x100811e4)
  • GetFullPathNameW (Address: 0x10081024)
  • GetLastError (Address: 0x10081000)
  • GetLocaleInfoEx (Address: 0x10081194)
  • GetLocaleInfoW (Address: 0x10081218)
  • GetLocalTime (Address: 0x100810b8)
  • GetModuleFileNameW (Address: 0x10081008)
  • GetModuleHandleExW (Address: 0x100811fc)
  • GetModuleHandleW (Address: 0x10081010)
  • GetOEMCP (Address: 0x10081254)
  • GetProcAddress (Address: 0x10081014)
  • GetProcessHeap (Address: 0x10081034)
  • GetStartupInfoW (Address: 0x100811c0)
  • GetStdHandle (Address: 0x10081204)
  • GetStringTypeW (Address: 0x10081178)
  • GetSystemDirectoryW (Address: 0x100810c4)
  • GetSystemInfo (Address: 0x1008113c)
  • GetSystemTimeAsFileTime (Address: 0x10081190)
  • GetSystemWow64DirectoryW (Address: 0x100810c8)
  • GetThreadContext (Address: 0x10081108)
  • GetTickCount (Address: 0x1008112c)
  • GetTimeFormatW (Address: 0x1008120c)
  • GetTimeZoneInformation (Address: 0x10081240)
  • GetUserDefaultLCID (Address: 0x10081220)
  • HeapAlloc (Address: 0x1008102c)
  • HeapFree (Address: 0x10081030)
  • HeapReAlloc (Address: 0x10081248)
  • HeapSize (Address: 0x10081138)
  • InitializeConditionVariable (Address: 0x10081164)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100810f8)
  • InitializeCriticalSectionEx (Address: 0x10081154)
  • InitializeSListHead (Address: 0x100811c4)
  • InitializeSRWLock (Address: 0x10081140)
  • InterlockedFlushSList (Address: 0x100811cc)
  • IsDebuggerPresent (Address: 0x100811bc)
  • IsProcessorFeaturePresent (Address: 0x100811b8)
  • IsValidCodePage (Address: 0x1008124c)
  • IsValidLocale (Address: 0x1008121c)
  • LCMapStringEx (Address: 0x1008118c)
  • LCMapStringW (Address: 0x10081214)
  • LeaveCriticalSection (Address: 0x10081150)
  • LoadLibraryExA (Address: 0x1008111c)
  • LoadLibraryExW (Address: 0x10081120)
  • LoadLibraryW (Address: 0x10081018)
  • lstrlenW (Address: 0x10081038)
  • MapViewOfFile (Address: 0x100810a4)
  • MapViewOfFileEx (Address: 0x100810a8)
  • MoveFileW (Address: 0x100810b0)
  • MultiByteToWideChar (Address: 0x100810b4)
  • OpenFileMappingW (Address: 0x100810a0)
  • OpenProcess (Address: 0x100810dc)
  • OutputDebugStringW (Address: 0x10081078)
  • PeekNamedPipe (Address: 0x100811e8)
  • Process32FirstW (Address: 0x100810e4)
  • Process32NextW (Address: 0x100810e8)
  • ProcessIdToSessionId (Address: 0x100810d8)
  • QueryPerformanceCounter (Address: 0x1008115c)
  • RaiseException (Address: 0x100810f4)
  • ReadConsoleW (Address: 0x1008123c)
  • ReadFile (Address: 0x10081064)
  • ReleaseMutex (Address: 0x1008107c)
  • ReleaseSRWLockExclusive (Address: 0x10081144)
  • RemoveDirectoryW (Address: 0x10081068)
  • ResetEvent (Address: 0x100811a4)
  • ResumeThread (Address: 0x10081104)
  • RtlCaptureStackBackTrace (Address: 0x1008101c)
  • RtlUnwind (Address: 0x100811c8)
  • SetEndOfFile (Address: 0x1008106c)
  • SetEnvironmentVariableW (Address: 0x10081244)
  • SetEvent (Address: 0x100811a0)
  • SetFilePointer (Address: 0x10081070)
  • SetFilePointerEx (Address: 0x10081184)
  • SetLastError (Address: 0x100810ec)
  • SetStdHandle (Address: 0x10081228)
  • SetThreadContext (Address: 0x1008110c)
  • SetUnhandledExceptionFilter (Address: 0x100811b0)
  • Sleep (Address: 0x10081088)
  • SleepConditionVariableCS (Address: 0x10081170)
  • SleepConditionVariableSRW (Address: 0x10081174)
  • SuspendThread (Address: 0x10081100)
  • SystemTimeToFileTime (Address: 0x10081134)
  • SystemTimeToTzSpecificLocalTime (Address: 0x100811ec)
  • TerminateProcess (Address: 0x100811b4)
  • TlsAlloc (Address: 0x100811d0)
  • TlsFree (Address: 0x100811dc)
  • TlsGetValue (Address: 0x100811d4)
  • TlsSetValue (Address: 0x100811d8)
  • TryEnterCriticalSection (Address: 0x10081158)
  • UnhandledExceptionFilter (Address: 0x100811ac)
  • UnmapViewOfFile (Address: 0x100810ac)
  • VerifyVersionInfoW (Address: 0x100810d0)
  • VerSetConditionMask (Address: 0x100810c0)
  • VirtualAlloc (Address: 0x10081094)
  • VirtualFree (Address: 0x10081098)
  • VirtualProtect (Address: 0x10081114)
  • VirtualQuery (Address: 0x10081118)
  • WaitForSingleObject (Address: 0x10081080)
  • WaitForSingleObjectEx (Address: 0x10081160)
  • WakeAllConditionVariable (Address: 0x1008116c)
  • WakeConditionVariable (Address: 0x10081168)
  • WideCharToMultiByte (Address: 0x1008103c)
  • WriteConsoleW (Address: 0x10081264)
  • WriteFile (Address: 0x10081074)