kwpswinappext.dll
Description: kwpswinappext
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23125
Architecture: 64-bit
Operating System: Windows NT
SHA256: f3adcad2c54471a560acb583ee0810db
File Size: 1.4 MB
Uploaded At: Dec. 4, 2025, 6:12 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x27e0)
- DllGetActivationFactory (Ordinal: 2, Address: 0x2890)
- DllGetClassObject (Ordinal: 3, Address: 0x2a80)
Imported DLLs & Functions
api-ms-win-core-winrt-error-l1-1-0.dll
- RoOriginateError (Address: 0x1801024b8)
- RoOriginateErrorW (Address: 0x1801024b0)
api-ms-win-core-winrt-string-l1-1-0.dll
- WindowsGetStringRawBuffer (Address: 0x1801024c8)
- WindowsIsStringEmpty (Address: 0x1801024d8)
- WindowsStringHasEmbeddedNull (Address: 0x1801024d0)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180102028)
- AcquireSRWLockShared (Address: 0x180102030)
- AreFileApisANSI (Address: 0x180102338)
- CloseHandle (Address: 0x180102080)
- CompareFileTime (Address: 0x1801020d8)
- CompareStringEx (Address: 0x180102368)
- CompareStringW (Address: 0x180102448)
- CreateDirectoryW (Address: 0x1801020e0)
- CreateEventW (Address: 0x180102238)
- CreateFileW (Address: 0x1801020e8)
- CreateProcessW (Address: 0x180102208)
- CreateToolhelp32Snapshot (Address: 0x1801021a8)
- DecodePointer (Address: 0x180102010)
- DeleteCriticalSection (Address: 0x1801020c8)
- DeleteFileW (Address: 0x180102200)
- EncodePointer (Address: 0x180102008)
- EnterCriticalSection (Address: 0x180102220)
- EnumSystemLocalesW (Address: 0x180102470)
- ExitProcess (Address: 0x180102420)
- ExpandEnvironmentStringsW (Address: 0x180102170)
- FileTimeToSystemTime (Address: 0x180102148)
- FindClose (Address: 0x1801020f0)
- FindFirstFileExW (Address: 0x180102328)
- FindFirstFileW (Address: 0x1801020f8)
- FindNextFileW (Address: 0x180102100)
- FlushFileBuffers (Address: 0x180102488)
- FlushInstructionCache (Address: 0x180102278)
- FormatMessageA (Address: 0x1801022f8)
- FreeEnvironmentStringsW (Address: 0x1801022c0)
- FreeLibrary (Address: 0x180102198)
- GetACP (Address: 0x1801022e0)
- GetCommandLineA (Address: 0x1801022d0)
- GetCommandLineW (Address: 0x1801021c0)
- GetCompressedFileSizeW (Address: 0x180102230)
- GetConsoleCP (Address: 0x180102490)
- GetConsoleMode (Address: 0x180102478)
- GetCPInfo (Address: 0x180102370)
- GetCurrentProcess (Address: 0x180102180)
- GetCurrentProcessId (Address: 0x180102038)
- GetCurrentThread (Address: 0x180102088)
- GetCurrentThreadId (Address: 0x180102040)
- GetDateFormatW (Address: 0x180102438)
- GetEnvironmentStringsW (Address: 0x1801022c8)
- GetEnvironmentVariableW (Address: 0x1801021f0)
- GetFileAttributesExW (Address: 0x180102110)
- GetFileAttributesW (Address: 0x180102108)
- GetFileInformationByHandleEx (Address: 0x180102340)
- GetFileSizeEx (Address: 0x180102118)
- GetFileType (Address: 0x180102430)
- GetLastError (Address: 0x1801020b8)
- GetLocaleInfoEx (Address: 0x180102360)
- GetLocaleInfoW (Address: 0x180102458)
- GetLocalTime (Address: 0x180102070)
- GetLongPathNameW (Address: 0x180102218)
- GetModuleFileNameW (Address: 0x1801021c8)
- GetModuleHandleExW (Address: 0x180102418)
- GetModuleHandleW (Address: 0x180102098)
- GetOEMCP (Address: 0x1801022d8)
- GetPrivateProfileIntW (Address: 0x1801021d8)
- GetPrivateProfileStringW (Address: 0x1801021e0)
- GetProcAddress (Address: 0x1801020a0)
- GetProcessHeap (Address: 0x180102068)
- GetStartupInfoW (Address: 0x1801023c0)
- GetStdHandle (Address: 0x180102428)
- GetStringTypeW (Address: 0x180102300)
- GetSystemDirectoryW (Address: 0x180102190)
- GetSystemInfo (Address: 0x1801022f0)
- GetSystemTime (Address: 0x180102138)
- GetSystemTimeAsFileTime (Address: 0x180102358)
- GetThreadContext (Address: 0x180102268)
- GetTickCount (Address: 0x180102078)
- GetTimeFormatW (Address: 0x180102440)
- GetTimeZoneInformation (Address: 0x180102498)
- GetUserDefaultLCID (Address: 0x180102468)
- GetUserDefaultUILanguage (Address: 0x1801021e8)
- HeapAlloc (Address: 0x180102048)
- HeapFree (Address: 0x180102058)
- HeapReAlloc (Address: 0x180102050)
- HeapSize (Address: 0x180102060)
- InitializeCriticalSectionAndSpinCount (Address: 0x1801020c0)
- InitializeCriticalSectionEx (Address: 0x180102318)
- InitializeSListHead (Address: 0x180102390)
- InitializeSRWLock (Address: 0x180102310)
- InterlockedFlushSList (Address: 0x1801023f0)
- InterlockedPushEntrySList (Address: 0x1801023e8)
- IsDebuggerPresent (Address: 0x180102378)
- IsProcessorFeaturePresent (Address: 0x1801023c8)
- IsValidCodePage (Address: 0x1801022e8)
- IsValidLocale (Address: 0x180102460)
- LCMapStringEx (Address: 0x180102350)
- LCMapStringW (Address: 0x180102450)
- LeaveCriticalSection (Address: 0x180102228)
- LoadLibraryExA (Address: 0x1801022a0)
- LoadLibraryExW (Address: 0x1801022a8)
- LoadLibraryW (Address: 0x1801020d0)
- LocalFree (Address: 0x180102308)
- lstrlenW (Address: 0x1801021d0)
- MultiByteToWideChar (Address: 0x180102158)
- OpenProcess (Address: 0x180102090)
- OutputDebugStringA (Address: 0x180102240)
- OutputDebugStringW (Address: 0x180102000)
- Process32FirstW (Address: 0x1801021b0)
- Process32NextW (Address: 0x1801021b8)
- ProcessIdToSessionId (Address: 0x180102188)
- QueryFullProcessImageNameW (Address: 0x1801020a8)
- QueryPerformanceCounter (Address: 0x180102248)
- QueryPerformanceFrequency (Address: 0x180102250)
- RaiseException (Address: 0x1801020b0)
- ReadConsoleW (Address: 0x180102480)
- ReadFile (Address: 0x180102120)
- ReleaseSRWLockExclusive (Address: 0x180102018)
- ReleaseSRWLockShared (Address: 0x180102020)
- ResetEvent (Address: 0x180102388)
- ResumeThread (Address: 0x180102260)
- RtlCaptureContext (Address: 0x180102398)
- RtlLookupFunctionEntry (Address: 0x1801023a0)
- RtlPcToFileHeader (Address: 0x1801023e0)
- RtlUnwind (Address: 0x1801024a0)
- RtlUnwindEx (Address: 0x1801023d8)
- RtlVirtualUnwind (Address: 0x1801023a8)
- SetEndOfFile (Address: 0x180102330)
- SetEnvironmentVariableW (Address: 0x1801021f8)
- SetEvent (Address: 0x180102380)
- SetFilePointerEx (Address: 0x180102128)
- SetLastError (Address: 0x180102210)
- SetStdHandle (Address: 0x1801022b8)
- SetThreadContext (Address: 0x180102270)
- SetUnhandledExceptionFilter (Address: 0x1801023b8)
- Sleep (Address: 0x180102178)
- SuspendThread (Address: 0x180102258)
- SystemTimeToFileTime (Address: 0x180102150)
- SystemTimeToTzSpecificLocalTime (Address: 0x180102140)
- TerminateProcess (Address: 0x1801023d0)
- TlsAlloc (Address: 0x1801023f8)
- TlsFree (Address: 0x180102410)
- TlsGetValue (Address: 0x180102400)
- TlsSetValue (Address: 0x180102408)
- TryEnterCriticalSection (Address: 0x180102320)
- UnhandledExceptionFilter (Address: 0x1801023b0)
- VerifyVersionInfoW (Address: 0x1801021a0)
- VerSetConditionMask (Address: 0x180102168)
- VirtualAlloc (Address: 0x180102280)
- VirtualFree (Address: 0x180102290)
- VirtualProtect (Address: 0x180102288)
- VirtualQuery (Address: 0x180102298)
- WaitForSingleObjectEx (Address: 0x180102348)
- WideCharToMultiByte (Address: 0x180102160)
- WriteConsoleW (Address: 0x1801022b0)
- WriteFile (Address: 0x180102130)