kbaseconfigcenter.dll
Description:
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23542
Architecture: 32-bit
Operating System: Windows NT
SHA256: 940ccafde853b47a46b875125da955bb
File Size: 1.5 MB
Uploaded At: Dec. 4, 2025, 6:12 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- configBoolValue (Ordinal: 1, Address: 0x203b0)
- configEnable (Ordinal: 2, Address: 0x203d0)
- configFilter (Ordinal: 3, Address: 0x203f0)
- configIntValue (Ordinal: 4, Address: 0x20410)
- configSupport (Ordinal: 5, Address: 0x20430)
- configValue (Ordinal: 6, Address: 0x20450)
- getConfigValid (Ordinal: 7, Address: 0x20470)
- setConfigPath (Ordinal: 8, Address: 0x204b0)
- setEntCloudConfigPath (Ordinal: 9, Address: 0x204d0)
- setInstallLanguage (Ordinal: 10, Address: 0x204f0)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x100df1a4)
- AcquireSRWLockShared (Address: 0x100df1a8)
- AreFileApisANSI (Address: 0x100df194)
- CloseHandle (Address: 0x100df11c)
- CreateEventW (Address: 0x100df178)
- CreateFileW (Address: 0x100df118)
- CreateToolhelp32Snapshot (Address: 0x100df14c)
- DecodePointer (Address: 0x100df124)
- DeleteCriticalSection (Address: 0x100df050)
- DeleteFileW (Address: 0x100df128)
- EncodePointer (Address: 0x100df074)
- EnterCriticalSection (Address: 0x100df048)
- EnumSystemLocalesW (Address: 0x100df0d8)
- ExitProcess (Address: 0x100df07c)
- FindClose (Address: 0x100df094)
- FindFirstFileExW (Address: 0x100df098)
- FindNextFileW (Address: 0x100df09c)
- FlushFileBuffers (Address: 0x100df0f8)
- FormatMessageA (Address: 0x100df190)
- FreeEnvironmentStringsW (Address: 0x100df0c4)
- FreeLibrary (Address: 0x100df068)
- GetACP (Address: 0x100df0a4)
- GetCommandLineA (Address: 0x100df0b0)
- GetCommandLineW (Address: 0x100df0b4)
- GetConsoleCP (Address: 0x100df100)
- GetConsoleMode (Address: 0x100df104)
- GetCPInfo (Address: 0x100df0ac)
- GetCurrentProcess (Address: 0x100df02c)
- GetCurrentProcessId (Address: 0x100df004)
- GetCurrentThread (Address: 0x100df088)
- GetCurrentThreadId (Address: 0x100df008)
- GetEnvironmentStringsW (Address: 0x100df0c0)
- GetFileAttributesExW (Address: 0x100df17c)
- GetFileInformationByHandleEx (Address: 0x100df198)
- GetFileType (Address: 0x100df0e4)
- GetLastError (Address: 0x100df040)
- GetLocaleInfoW (Address: 0x100df0cc)
- GetModuleFileNameW (Address: 0x100df084)
- GetModuleHandleExW (Address: 0x100df080)
- GetModuleHandleW (Address: 0x100df028)
- GetOEMCP (Address: 0x100df0a8)
- GetPrivateProfileIntW (Address: 0x100df140)
- GetPrivateProfileStringW (Address: 0x100df144)
- GetProcAddress (Address: 0x100df06c)
- GetProcessHeap (Address: 0x100df0dc)
- GetStartupInfoW (Address: 0x100df020)
- GetStdHandle (Address: 0x100df0e0)
- GetStringTypeW (Address: 0x100df0e8)
- GetSystemDirectoryW (Address: 0x100df134)
- GetSystemInfo (Address: 0x100df15c)
- GetSystemTimeAsFileTime (Address: 0x100df00c)
- GetSystemWow64DirectoryW (Address: 0x100df138)
- GetUserDefaultLCID (Address: 0x100df0d4)
- GetUserDefaultUILanguage (Address: 0x100df148)
- HeapAlloc (Address: 0x100df08c)
- HeapFree (Address: 0x100df090)
- HeapReAlloc (Address: 0x100df0f0)
- HeapSize (Address: 0x100df0ec)
- InitializeCriticalSectionAndSpinCount (Address: 0x100df054)
- InitializeCriticalSectionEx (Address: 0x100df1ac)
- InitializeSListHead (Address: 0x100df010)
- InitOnceBeginInitialize (Address: 0x100df184)
- InitOnceComplete (Address: 0x100df188)
- InterlockedFlushSList (Address: 0x100df038)
- InterlockedPushEntrySList (Address: 0x100df034)
- IsDebuggerPresent (Address: 0x100df014)
- IsProcessorFeaturePresent (Address: 0x100df024)
- IsValidCodePage (Address: 0x100df0a0)
- IsValidLocale (Address: 0x100df0d0)
- LCMapStringEx (Address: 0x100df1b0)
- LCMapStringW (Address: 0x100df0c8)
- LeaveCriticalSection (Address: 0x100df04c)
- LoadLibraryExA (Address: 0x100df168)
- LoadLibraryExW (Address: 0x100df070)
- LoadLibraryW (Address: 0x100df13c)
- LocalFree (Address: 0x100df18c)
- MultiByteToWideChar (Address: 0x100df0b8)
- OpenProcess (Address: 0x100df130)
- OutputDebugStringW (Address: 0x100df114)
- Process32FirstW (Address: 0x100df150)
- Process32NextW (Address: 0x100df154)
- ProcessIdToSessionId (Address: 0x100df12c)
- QueryPerformanceCounter (Address: 0x100df000)
- QueryPerformanceFrequency (Address: 0x100df158)
- RaiseException (Address: 0x100df078)
- ReadConsoleW (Address: 0x100df110)
- ReadFile (Address: 0x100df10c)
- ReleaseSRWLockExclusive (Address: 0x100df19c)
- ReleaseSRWLockShared (Address: 0x100df1a0)
- ResetEvent (Address: 0x100df170)
- RtlUnwind (Address: 0x100df03c)
- SetEndOfFile (Address: 0x100df180)
- SetEvent (Address: 0x100df16c)
- SetFilePointerEx (Address: 0x100df108)
- SetLastError (Address: 0x100df044)
- SetStdHandle (Address: 0x100df0f4)
- SetUnhandledExceptionFilter (Address: 0x100df01c)
- TerminateProcess (Address: 0x100df030)
- TlsAlloc (Address: 0x100df058)
- TlsFree (Address: 0x100df064)
- TlsGetValue (Address: 0x100df05c)
- TlsSetValue (Address: 0x100df060)
- UnhandledExceptionFilter (Address: 0x100df018)
- VirtualProtect (Address: 0x100df160)
- VirtualQuery (Address: 0x100df164)
- WaitForSingleObjectEx (Address: 0x100df174)
- WideCharToMultiByte (Address: 0x100df0bc)
- WriteConsoleW (Address: 0x100df120)
- WriteFile (Address: 0x100df0fc)