kbaseconfigcenter64.dll
Description:
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23542
Architecture: 64-bit
Operating System: Windows NT
SHA256: ea620fe8957c1862b33feb62c57f9d76
File Size: 2.0 MB
Uploaded At: Dec. 4, 2025, 6:12 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- configBoolValue (Ordinal: 1, Address: 0x25d40)
- configEnable (Ordinal: 2, Address: 0x25d80)
- configFilter (Ordinal: 3, Address: 0x25da0)
- configIntValue (Ordinal: 4, Address: 0x25dc0)
- configSupport (Ordinal: 5, Address: 0x25e00)
- configValue (Ordinal: 6, Address: 0x25e20)
- getConfigValid (Ordinal: 7, Address: 0x25e60)
- setConfigPath (Ordinal: 8, Address: 0x25ed0)
- setEntCloudConfigPath (Ordinal: 9, Address: 0x25f00)
- setInstallLanguage (Ordinal: 10, Address: 0x25f20)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180104360)
- AcquireSRWLockShared (Address: 0x180104368)
- AreFileApisANSI (Address: 0x180104340)
- CloseHandle (Address: 0x180104258)
- CreateEventW (Address: 0x180104308)
- CreateFileW (Address: 0x180104250)
- CreateToolhelp32Snapshot (Address: 0x1801042b0)
- DecodePointer (Address: 0x180104270)
- DeleteCriticalSection (Address: 0x1801040a8)
- DeleteFileW (Address: 0x180104268)
- EncodePointer (Address: 0x1801040f0)
- EnterCriticalSection (Address: 0x180104098)
- EnumSystemLocalesW (Address: 0x1801041d0)
- ExitProcess (Address: 0x180104110)
- FindClose (Address: 0x180104148)
- FindFirstFileExW (Address: 0x180104150)
- FindNextFileW (Address: 0x180104158)
- FlushFileBuffers (Address: 0x180104210)
- FormatMessageA (Address: 0x180104338)
- FreeEnvironmentStringsW (Address: 0x1801041a8)
- FreeLibrary (Address: 0x1801040d8)
- GetACP (Address: 0x180104168)
- GetCommandLineA (Address: 0x180104180)
- GetCommandLineW (Address: 0x180104188)
- GetConsoleCP (Address: 0x180104220)
- GetConsoleMode (Address: 0x180104228)
- GetCPInfo (Address: 0x180104178)
- GetCurrentProcess (Address: 0x180104108)
- GetCurrentProcessId (Address: 0x180104008)
- GetCurrentThread (Address: 0x180104130)
- GetCurrentThreadId (Address: 0x180104010)
- GetEnvironmentStringsW (Address: 0x1801041a0)
- GetFileAttributesExW (Address: 0x180104310)
- GetFileInformationByHandleEx (Address: 0x180104348)
- GetFileType (Address: 0x1801041e8)
- GetLastError (Address: 0x180104088)
- GetLocaleInfoW (Address: 0x1801041b8)
- GetModuleFileNameW (Address: 0x180104128)
- GetModuleHandleExW (Address: 0x180104120)
- GetModuleHandleW (Address: 0x180104068)
- GetOEMCP (Address: 0x180104170)
- GetPrivateProfileIntW (Address: 0x180104298)
- GetPrivateProfileStringW (Address: 0x1801042a0)
- GetProcAddress (Address: 0x1801040e0)
- GetProcessHeap (Address: 0x1801041d8)
- GetStartupInfoW (Address: 0x180104058)
- GetStdHandle (Address: 0x1801041e0)
- GetStringTypeW (Address: 0x1801041f0)
- GetSystemDirectoryW (Address: 0x180104288)
- GetSystemInfo (Address: 0x1801042d0)
- GetSystemTimeAsFileTime (Address: 0x180104018)
- GetUserDefaultLCID (Address: 0x1801041c8)
- GetUserDefaultUILanguage (Address: 0x1801042a8)
- HeapAlloc (Address: 0x180104138)
- HeapFree (Address: 0x180104140)
- HeapReAlloc (Address: 0x180104200)
- HeapSize (Address: 0x1801041f8)
- InitializeCriticalSectionAndSpinCount (Address: 0x1801040b0)
- InitializeCriticalSectionEx (Address: 0x180104370)
- InitializeSListHead (Address: 0x180104020)
- InitOnceBeginInitialize (Address: 0x180104320)
- InitOnceComplete (Address: 0x180104328)
- InterlockedFlushSList (Address: 0x180104080)
- InterlockedPushEntrySList (Address: 0x180104078)
- IsDebuggerPresent (Address: 0x180104040)
- IsProcessorFeaturePresent (Address: 0x180104060)
- IsValidCodePage (Address: 0x180104160)
- IsValidLocale (Address: 0x1801041c0)
- LCMapStringEx (Address: 0x180104378)
- LCMapStringW (Address: 0x1801041b0)
- LeaveCriticalSection (Address: 0x1801040a0)
- LoadLibraryExA (Address: 0x1801042e8)
- LoadLibraryExW (Address: 0x1801040e8)
- LoadLibraryW (Address: 0x180104290)
- LocalFree (Address: 0x180104330)
- MultiByteToWideChar (Address: 0x180104190)
- OpenProcess (Address: 0x180104280)
- OutputDebugStringW (Address: 0x180104248)
- Process32FirstW (Address: 0x1801042b8)
- Process32NextW (Address: 0x1801042c0)
- ProcessIdToSessionId (Address: 0x180104278)
- QueryPerformanceCounter (Address: 0x180104000)
- QueryPerformanceFrequency (Address: 0x1801042c8)
- RaiseException (Address: 0x1801040f8)
- ReadConsoleW (Address: 0x180104240)
- ReadFile (Address: 0x180104238)
- ReleaseSRWLockExclusive (Address: 0x180104350)
- ReleaseSRWLockShared (Address: 0x180104358)
- ResetEvent (Address: 0x1801042f8)
- RtlCaptureContext (Address: 0x180104028)
- RtlLookupFunctionEntry (Address: 0x180104030)
- RtlPcToFileHeader (Address: 0x180104100)
- RtlUnwindEx (Address: 0x180104070)
- RtlVirtualUnwind (Address: 0x180104038)
- SetEndOfFile (Address: 0x180104318)
- SetEvent (Address: 0x1801042f0)
- SetFilePointerEx (Address: 0x180104230)
- SetLastError (Address: 0x180104090)
- SetStdHandle (Address: 0x180104208)
- SetUnhandledExceptionFilter (Address: 0x180104050)
- TerminateProcess (Address: 0x180104118)
- TlsAlloc (Address: 0x1801040b8)
- TlsFree (Address: 0x1801040d0)
- TlsGetValue (Address: 0x1801040c0)
- TlsSetValue (Address: 0x1801040c8)
- UnhandledExceptionFilter (Address: 0x180104048)
- VirtualProtect (Address: 0x1801042d8)
- VirtualQuery (Address: 0x1801042e0)
- WaitForSingleObjectEx (Address: 0x180104300)
- WideCharToMultiByte (Address: 0x180104198)
- WriteConsoleW (Address: 0x180104260)
- WriteFile (Address: 0x180104218)