qingshellext.dll

Description: qingbangong shellext

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23542

Architecture: 32-bit

Operating System: Windows NT

SHA256: 61314c6cb608b19b0f9cf29911849ab2

File Size: 667.0 KB

Uploaded At: Dec. 4, 2025, 6:12 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x3400)
  • DllGetClassObject (Ordinal: 2, Address: 0x3470)
  • DllInstall (Ordinal: 3, Address: 0x3610)
  • DllRegisterServer (Ordinal: 4, Address: 0x3640)
  • DllUnregisterServer (Ordinal: 5, Address: 0x3d70)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x10070194)
  • AreFileApisANSI (Address: 0x100701b0)
  • CloseHandle (Address: 0x1007006c)
  • CreateEventW (Address: 0x100700c4)
  • CreateFileMappingW (Address: 0x1007011c)
  • CreateFileW (Address: 0x10070060)
  • CreateMutexW (Address: 0x10070114)
  • CreateToolhelp32Snapshot (Address: 0x10070104)
  • DecodePointer (Address: 0x10070000)
  • DeleteCriticalSection (Address: 0x10070010)
  • DeleteFileW (Address: 0x1007008c)
  • DeviceIoControl (Address: 0x100700f8)
  • DisableThreadLibraryCalls (Address: 0x10070014)
  • EncodePointer (Address: 0x1007001c)
  • EnterCriticalSection (Address: 0x10070038)
  • EnumSystemLocalesW (Address: 0x10070220)
  • ExitProcess (Address: 0x10070204)
  • ExpandEnvironmentStringsW (Address: 0x1007014c)
  • FindClose (Address: 0x10070090)
  • FindFirstFileExW (Address: 0x100701a0)
  • FindFirstFileW (Address: 0x10070094)
  • FindNextFileW (Address: 0x10070098)
  • FindResourceExW (Address: 0x10070040)
  • FindResourceW (Address: 0x1007005c)
  • FlushFileBuffers (Address: 0x1007022c)
  • FormatMessageA (Address: 0x10070184)
  • FreeEnvironmentStringsW (Address: 0x1007024c)
  • FreeLibrary (Address: 0x10070080)
  • FreeResource (Address: 0x100700e4)
  • GetACP (Address: 0x1007023c)
  • GetCommandLineA (Address: 0x10070244)
  • GetCommandLineW (Address: 0x1007012c)
  • GetConsoleCP (Address: 0x10070230)
  • GetConsoleMode (Address: 0x10070224)
  • GetCPInfo (Address: 0x100701c0)
  • GetCurrentProcess (Address: 0x10070150)
  • GetCurrentProcessId (Address: 0x10070154)
  • GetCurrentThread (Address: 0x10070158)
  • GetCurrentThreadId (Address: 0x100700c8)
  • GetDriveTypeW (Address: 0x100700f4)
  • GetEnvironmentStringsW (Address: 0x10070248)
  • GetEnvironmentVariableW (Address: 0x10070144)
  • GetFileAttributesExW (Address: 0x100701a4)
  • GetFileAttributesW (Address: 0x100700dc)
  • GetFileInformationByHandleEx (Address: 0x100701b4)
  • GetFileSizeEx (Address: 0x10070234)
  • GetFileType (Address: 0x1007020c)
  • GetLastError (Address: 0x10070008)
  • GetLocaleInfoW (Address: 0x10070214)
  • GetLongPathNameW (Address: 0x10070168)
  • GetModuleFileNameW (Address: 0x10070044)
  • GetModuleHandleExW (Address: 0x100700fc)
  • GetModuleHandleW (Address: 0x10070048)
  • GetOEMCP (Address: 0x10070240)
  • GetPrivateProfileIntW (Address: 0x10070138)
  • GetPrivateProfileStringW (Address: 0x1007013c)
  • GetProcAddress (Address: 0x1007004c)
  • GetProcessHeap (Address: 0x10070034)
  • GetProcessId (Address: 0x100700b0)
  • GetStartupInfoW (Address: 0x100701e4)
  • GetStdHandle (Address: 0x10070208)
  • GetStringTypeW (Address: 0x10070188)
  • GetSystemDirectoryW (Address: 0x10070130)
  • GetSystemInfo (Address: 0x10070178)
  • GetSystemTimeAsFileTime (Address: 0x100701bc)
  • GetSystemWow64DirectoryW (Address: 0x100700cc)
  • GetTempFileNameW (Address: 0x1007009c)
  • GetTempPathW (Address: 0x100700a8)
  • GetUserDefaultLCID (Address: 0x1007021c)
  • GetUserDefaultUILanguage (Address: 0x10070140)
  • GlobalAlloc (Address: 0x100700e8)
  • GlobalFree (Address: 0x100700ec)
  • GlobalLock (Address: 0x100700d4)
  • GlobalUnlock (Address: 0x100700d0)
  • HeapAlloc (Address: 0x10070024)
  • HeapDestroy (Address: 0x10070020)
  • HeapFree (Address: 0x1007002c)
  • HeapReAlloc (Address: 0x10070028)
  • HeapSize (Address: 0x10070030)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1007000c)
  • InitializeCriticalSectionEx (Address: 0x10070198)
  • InitializeSListHead (Address: 0x100701e0)
  • InitializeSRWLock (Address: 0x1007018c)
  • InterlockedFlushSList (Address: 0x100701ec)
  • IsDebuggerPresent (Address: 0x100701c4)
  • IsProcessorFeaturePresent (Address: 0x100701dc)
  • IsValidCodePage (Address: 0x10070238)
  • IsValidLocale (Address: 0x10070218)
  • LCMapStringEx (Address: 0x100701b8)
  • LCMapStringW (Address: 0x10070210)
  • LeaveCriticalSection (Address: 0x1007003c)
  • LoadLibraryExA (Address: 0x10070180)
  • LoadLibraryExW (Address: 0x10070084)
  • LoadLibraryW (Address: 0x10070100)
  • LoadResource (Address: 0x10070050)
  • LocalFree (Address: 0x100700b4)
  • LockResource (Address: 0x10070054)
  • lstrcmpiW (Address: 0x10070088)
  • lstrlenW (Address: 0x10070134)
  • MapViewOfFile (Address: 0x10070124)
  • MulDiv (Address: 0x100700f0)
  • MultiByteToWideChar (Address: 0x10070078)
  • OpenFileMappingW (Address: 0x10070120)
  • OpenMutexW (Address: 0x100700ac)
  • OpenProcess (Address: 0x10070160)
  • OutputDebugStringW (Address: 0x10070018)
  • Process32FirstW (Address: 0x10070108)
  • Process32NextW (Address: 0x1007010c)
  • ProcessIdToSessionId (Address: 0x1007015c)
  • QueryPerformanceCounter (Address: 0x1007016c)
  • QueryPerformanceFrequency (Address: 0x10070170)
  • RaiseException (Address: 0x10070004)
  • ReadConsoleW (Address: 0x10070228)
  • ReadFile (Address: 0x10070064)
  • ReleaseMutex (Address: 0x10070110)
  • ReleaseSRWLockExclusive (Address: 0x10070190)
  • ResetEvent (Address: 0x100701c8)
  • RtlUnwind (Address: 0x100701e8)
  • SetEndOfFile (Address: 0x100701a8)
  • SetEnvironmentVariableW (Address: 0x10070148)
  • SetEvent (Address: 0x100700bc)
  • SetFileAttributesW (Address: 0x100700a0)
  • SetFilePointer (Address: 0x100700a4)
  • SetFilePointerEx (Address: 0x100701ac)
  • SetLastError (Address: 0x10070164)
  • SetNamedPipeHandleState (Address: 0x10070070)
  • SetStdHandle (Address: 0x10070174)
  • SetUnhandledExceptionFilter (Address: 0x100701d4)
  • SizeofResource (Address: 0x10070058)
  • Sleep (Address: 0x100700b8)
  • TerminateProcess (Address: 0x100701d8)
  • TlsAlloc (Address: 0x100701f0)
  • TlsFree (Address: 0x100701fc)
  • TlsGetValue (Address: 0x100701f4)
  • TlsSetValue (Address: 0x100701f8)
  • TryEnterCriticalSection (Address: 0x1007019c)
  • UnhandledExceptionFilter (Address: 0x100701d0)
  • UnmapViewOfFile (Address: 0x10070128)
  • VerifyVersionInfoW (Address: 0x100700e0)
  • VerSetConditionMask (Address: 0x100700d8)
  • VirtualAlloc (Address: 0x10070200)
  • VirtualProtect (Address: 0x1007017c)
  • VirtualQuery (Address: 0x10070118)
  • WaitForSingleObject (Address: 0x100700c0)
  • WaitForSingleObjectEx (Address: 0x100701cc)
  • WaitNamedPipeW (Address: 0x10070074)
  • WideCharToMultiByte (Address: 0x1007007c)
  • WriteConsoleW (Address: 0x10070250)
  • WriteFile (Address: 0x10070068)