kbaseconfigcenter.dll

Description:

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23542

Architecture: 32-bit

Operating System: Windows NT

SHA256: 940ccafde853b47a46b875125da955bb

File Size: 1.5 MB

Uploaded At: Dec. 4, 2025, 6:12 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • configBoolValue (Ordinal: 1, Address: 0x203b0)
  • configEnable (Ordinal: 2, Address: 0x203d0)
  • configFilter (Ordinal: 3, Address: 0x203f0)
  • configIntValue (Ordinal: 4, Address: 0x20410)
  • configSupport (Ordinal: 5, Address: 0x20430)
  • configValue (Ordinal: 6, Address: 0x20450)
  • getConfigValid (Ordinal: 7, Address: 0x20470)
  • setConfigPath (Ordinal: 8, Address: 0x204b0)
  • setEntCloudConfigPath (Ordinal: 9, Address: 0x204d0)
  • setInstallLanguage (Ordinal: 10, Address: 0x204f0)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x100df1a4)
  • AcquireSRWLockShared (Address: 0x100df1a8)
  • AreFileApisANSI (Address: 0x100df194)
  • CloseHandle (Address: 0x100df11c)
  • CreateEventW (Address: 0x100df178)
  • CreateFileW (Address: 0x100df118)
  • CreateToolhelp32Snapshot (Address: 0x100df14c)
  • DecodePointer (Address: 0x100df124)
  • DeleteCriticalSection (Address: 0x100df050)
  • DeleteFileW (Address: 0x100df128)
  • EncodePointer (Address: 0x100df074)
  • EnterCriticalSection (Address: 0x100df048)
  • EnumSystemLocalesW (Address: 0x100df0d8)
  • ExitProcess (Address: 0x100df07c)
  • FindClose (Address: 0x100df094)
  • FindFirstFileExW (Address: 0x100df098)
  • FindNextFileW (Address: 0x100df09c)
  • FlushFileBuffers (Address: 0x100df0f8)
  • FormatMessageA (Address: 0x100df190)
  • FreeEnvironmentStringsW (Address: 0x100df0c4)
  • FreeLibrary (Address: 0x100df068)
  • GetACP (Address: 0x100df0a4)
  • GetCommandLineA (Address: 0x100df0b0)
  • GetCommandLineW (Address: 0x100df0b4)
  • GetConsoleCP (Address: 0x100df100)
  • GetConsoleMode (Address: 0x100df104)
  • GetCPInfo (Address: 0x100df0ac)
  • GetCurrentProcess (Address: 0x100df02c)
  • GetCurrentProcessId (Address: 0x100df004)
  • GetCurrentThread (Address: 0x100df088)
  • GetCurrentThreadId (Address: 0x100df008)
  • GetEnvironmentStringsW (Address: 0x100df0c0)
  • GetFileAttributesExW (Address: 0x100df17c)
  • GetFileInformationByHandleEx (Address: 0x100df198)
  • GetFileType (Address: 0x100df0e4)
  • GetLastError (Address: 0x100df040)
  • GetLocaleInfoW (Address: 0x100df0cc)
  • GetModuleFileNameW (Address: 0x100df084)
  • GetModuleHandleExW (Address: 0x100df080)
  • GetModuleHandleW (Address: 0x100df028)
  • GetOEMCP (Address: 0x100df0a8)
  • GetPrivateProfileIntW (Address: 0x100df140)
  • GetPrivateProfileStringW (Address: 0x100df144)
  • GetProcAddress (Address: 0x100df06c)
  • GetProcessHeap (Address: 0x100df0dc)
  • GetStartupInfoW (Address: 0x100df020)
  • GetStdHandle (Address: 0x100df0e0)
  • GetStringTypeW (Address: 0x100df0e8)
  • GetSystemDirectoryW (Address: 0x100df134)
  • GetSystemInfo (Address: 0x100df15c)
  • GetSystemTimeAsFileTime (Address: 0x100df00c)
  • GetSystemWow64DirectoryW (Address: 0x100df138)
  • GetUserDefaultLCID (Address: 0x100df0d4)
  • GetUserDefaultUILanguage (Address: 0x100df148)
  • HeapAlloc (Address: 0x100df08c)
  • HeapFree (Address: 0x100df090)
  • HeapReAlloc (Address: 0x100df0f0)
  • HeapSize (Address: 0x100df0ec)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100df054)
  • InitializeCriticalSectionEx (Address: 0x100df1ac)
  • InitializeSListHead (Address: 0x100df010)
  • InitOnceBeginInitialize (Address: 0x100df184)
  • InitOnceComplete (Address: 0x100df188)
  • InterlockedFlushSList (Address: 0x100df038)
  • InterlockedPushEntrySList (Address: 0x100df034)
  • IsDebuggerPresent (Address: 0x100df014)
  • IsProcessorFeaturePresent (Address: 0x100df024)
  • IsValidCodePage (Address: 0x100df0a0)
  • IsValidLocale (Address: 0x100df0d0)
  • LCMapStringEx (Address: 0x100df1b0)
  • LCMapStringW (Address: 0x100df0c8)
  • LeaveCriticalSection (Address: 0x100df04c)
  • LoadLibraryExA (Address: 0x100df168)
  • LoadLibraryExW (Address: 0x100df070)
  • LoadLibraryW (Address: 0x100df13c)
  • LocalFree (Address: 0x100df18c)
  • MultiByteToWideChar (Address: 0x100df0b8)
  • OpenProcess (Address: 0x100df130)
  • OutputDebugStringW (Address: 0x100df114)
  • Process32FirstW (Address: 0x100df150)
  • Process32NextW (Address: 0x100df154)
  • ProcessIdToSessionId (Address: 0x100df12c)
  • QueryPerformanceCounter (Address: 0x100df000)
  • QueryPerformanceFrequency (Address: 0x100df158)
  • RaiseException (Address: 0x100df078)
  • ReadConsoleW (Address: 0x100df110)
  • ReadFile (Address: 0x100df10c)
  • ReleaseSRWLockExclusive (Address: 0x100df19c)
  • ReleaseSRWLockShared (Address: 0x100df1a0)
  • ResetEvent (Address: 0x100df170)
  • RtlUnwind (Address: 0x100df03c)
  • SetEndOfFile (Address: 0x100df180)
  • SetEvent (Address: 0x100df16c)
  • SetFilePointerEx (Address: 0x100df108)
  • SetLastError (Address: 0x100df044)
  • SetStdHandle (Address: 0x100df0f4)
  • SetUnhandledExceptionFilter (Address: 0x100df01c)
  • TerminateProcess (Address: 0x100df030)
  • TlsAlloc (Address: 0x100df058)
  • TlsFree (Address: 0x100df064)
  • TlsGetValue (Address: 0x100df05c)
  • TlsSetValue (Address: 0x100df060)
  • UnhandledExceptionFilter (Address: 0x100df018)
  • VirtualProtect (Address: 0x100df160)
  • VirtualQuery (Address: 0x100df164)
  • WaitForSingleObjectEx (Address: 0x100df174)
  • WideCharToMultiByte (Address: 0x100df0bc)
  • WriteConsoleW (Address: 0x100df120)
  • WriteFile (Address: 0x100df0fc)