kdesktopshellext64.dll

Description: wpsdesktop shellext

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23542

Architecture: 64-bit

Operating System: Windows NT

SHA256: 0283f4a9201aa095ab7fde842ed9a161

File Size: 983.0 KB

Uploaded At: Dec. 4, 2025, 6:13 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x2330)
  • DllGetClassObject (Ordinal: 2, Address: 0x23c0)
  • DllInstall (Ordinal: 3, Address: 0x2570)
  • DllRegisterServer (Ordinal: 4, Address: 0x25b0)
  • DllUnregisterServer (Ordinal: 5, Address: 0x2f30)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1800a8298)
  • AreFileApisANSI (Address: 0x1800a82d0)
  • CloseHandle (Address: 0x1800a80a8)
  • CompareFileTime (Address: 0x1800a8180)
  • CreateDirectoryW (Address: 0x1800a8188)
  • CreateEventW (Address: 0x1800a8318)
  • CreateFileW (Address: 0x1800a8190)
  • CreateToolhelp32Snapshot (Address: 0x1800a8210)
  • DecodePointer (Address: 0x1800a8000)
  • DeleteCriticalSection (Address: 0x1800a8020)
  • DeleteFileW (Address: 0x1800a8178)
  • DisableThreadLibraryCalls (Address: 0x1800a8028)
  • EncodePointer (Address: 0x1800a8038)
  • EnterCriticalSection (Address: 0x1800a8070)
  • EnumSystemLocalesW (Address: 0x1800a83f0)
  • ExitProcess (Address: 0x1800a83b0)
  • ExpandEnvironmentStringsW (Address: 0x1800a81d8)
  • FindClose (Address: 0x1800a8198)
  • FindFirstFileExW (Address: 0x1800a82c0)
  • FindNextFileW (Address: 0x1800a81a0)
  • FindResourceExW (Address: 0x1800a80c0)
  • FindResourceW (Address: 0x1800a80f8)
  • FlushFileBuffers (Address: 0x1800a8408)
  • FormatMessageA (Address: 0x1800a8280)
  • FreeEnvironmentStringsW (Address: 0x1800a8440)
  • FreeLibrary (Address: 0x1800a80c8)
  • FreeResource (Address: 0x1800a80d0)
  • GetACP (Address: 0x1800a8420)
  • GetCommandLineA (Address: 0x1800a8430)
  • GetCommandLineW (Address: 0x1800a8138)
  • GetConsoleCP (Address: 0x1800a8410)
  • GetConsoleMode (Address: 0x1800a83f8)
  • GetCPInfo (Address: 0x1800a82f0)
  • GetCurrentProcess (Address: 0x1800a81e8)
  • GetCurrentProcessId (Address: 0x1800a81f0)
  • GetCurrentThread (Address: 0x1800a81f8)
  • GetCurrentThreadId (Address: 0x1800a82b0)
  • GetEnvironmentStringsW (Address: 0x1800a8438)
  • GetFileAttributesExW (Address: 0x1800a80a0)
  • GetFileAttributesW (Address: 0x1800a8140)
  • GetFileInformationByHandleEx (Address: 0x1800a82d8)
  • GetFileSizeEx (Address: 0x1800a81a8)
  • GetFileType (Address: 0x1800a83c8)
  • GetLastError (Address: 0x1800a8010)
  • GetLocaleInfoW (Address: 0x1800a83d8)
  • GetLongPathNameW (Address: 0x1800a8230)
  • GetModuleFileNameW (Address: 0x1800a8080)
  • GetModuleHandleExW (Address: 0x1800a83b8)
  • GetModuleHandleW (Address: 0x1800a8088)
  • GetOEMCP (Address: 0x1800a8428)
  • GetPrivateProfileIntW (Address: 0x1800a8158)
  • GetPrivateProfileStringW (Address: 0x1800a8160)
  • GetProcAddress (Address: 0x1800a8090)
  • GetProcessHeap (Address: 0x1800a8068)
  • GetStartupInfoW (Address: 0x1800a8360)
  • GetStdHandle (Address: 0x1800a83c0)
  • GetStringTypeW (Address: 0x1800a82b8)
  • GetSystemDirectoryW (Address: 0x1800a80b8)
  • GetSystemInfo (Address: 0x1800a8258)
  • GetSystemTime (Address: 0x1800a81c8)
  • GetSystemTimeAsFileTime (Address: 0x1800a82e0)
  • GetUserDefaultLCID (Address: 0x1800a83e8)
  • GetUserDefaultUILanguage (Address: 0x1800a8170)
  • GlobalAlloc (Address: 0x1800a8100)
  • GlobalFree (Address: 0x1800a8118)
  • GlobalLock (Address: 0x1800a8110)
  • GlobalUnlock (Address: 0x1800a8108)
  • HeapAlloc (Address: 0x1800a8048)
  • HeapDestroy (Address: 0x1800a8040)
  • HeapFree (Address: 0x1800a8058)
  • HeapReAlloc (Address: 0x1800a8050)
  • HeapSize (Address: 0x1800a8060)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800a8018)
  • InitializeCriticalSectionEx (Address: 0x1800a82a0)
  • InitializeSListHead (Address: 0x1800a8358)
  • InitializeSRWLock (Address: 0x1800a8288)
  • InterlockedFlushSList (Address: 0x1800a8380)
  • InterlockedPushEntrySList (Address: 0x1800a8378)
  • IsDebuggerPresent (Address: 0x1800a82f8)
  • IsProcessorFeaturePresent (Address: 0x1800a8350)
  • IsValidCodePage (Address: 0x1800a8418)
  • IsValidLocale (Address: 0x1800a83e0)
  • LCMapStringEx (Address: 0x1800a82e8)
  • LCMapStringW (Address: 0x1800a83d0)
  • LeaveCriticalSection (Address: 0x1800a8078)
  • LoadLibraryExA (Address: 0x1800a8270)
  • LoadLibraryExW (Address: 0x1800a80d8)
  • LoadLibraryW (Address: 0x1800a8148)
  • LoadResource (Address: 0x1800a80e0)
  • LocalFree (Address: 0x1800a8278)
  • LockResource (Address: 0x1800a80e8)
  • lstrcmpiW (Address: 0x1800a8120)
  • lstrlenW (Address: 0x1800a8150)
  • MultiByteToWideChar (Address: 0x1800a8130)
  • OpenMutexW (Address: 0x1800a80b0)
  • OpenProcess (Address: 0x1800a8208)
  • OutputDebugStringA (Address: 0x1800a8238)
  • OutputDebugStringW (Address: 0x1800a8030)
  • Process32FirstW (Address: 0x1800a8218)
  • Process32NextW (Address: 0x1800a8220)
  • ProcessIdToSessionId (Address: 0x1800a8200)
  • QueryPerformanceCounter (Address: 0x1800a8240)
  • QueryPerformanceFrequency (Address: 0x1800a8248)
  • RaiseException (Address: 0x1800a8008)
  • ReadConsoleW (Address: 0x1800a8400)
  • ReadFile (Address: 0x1800a81b0)
  • ReleaseSRWLockExclusive (Address: 0x1800a8290)
  • ResetEvent (Address: 0x1800a8308)
  • RtlCaptureContext (Address: 0x1800a8320)
  • RtlLookupFunctionEntry (Address: 0x1800a8328)
  • RtlPcToFileHeader (Address: 0x1800a8370)
  • RtlUnwind (Address: 0x1800a8450)
  • RtlUnwindEx (Address: 0x1800a8368)
  • RtlVirtualUnwind (Address: 0x1800a8330)
  • SetEndOfFile (Address: 0x1800a82c8)
  • SetEvent (Address: 0x1800a8300)
  • SetFilePointerEx (Address: 0x1800a81b8)
  • SetLastError (Address: 0x1800a8228)
  • SetStdHandle (Address: 0x1800a8448)
  • SetUnhandledExceptionFilter (Address: 0x1800a8340)
  • SizeofResource (Address: 0x1800a80f0)
  • Sleep (Address: 0x1800a81e0)
  • SystemTimeToFileTime (Address: 0x1800a81d0)
  • TerminateProcess (Address: 0x1800a8348)
  • TlsAlloc (Address: 0x1800a8388)
  • TlsFree (Address: 0x1800a83a0)
  • TlsGetValue (Address: 0x1800a8390)
  • TlsSetValue (Address: 0x1800a8398)
  • TryEnterCriticalSection (Address: 0x1800a82a8)
  • UnhandledExceptionFilter (Address: 0x1800a8338)
  • VerifyVersionInfoW (Address: 0x1800a8128)
  • VerSetConditionMask (Address: 0x1800a8098)
  • VirtualAlloc (Address: 0x1800a83a8)
  • VirtualProtect (Address: 0x1800a8260)
  • VirtualQuery (Address: 0x1800a8268)
  • WaitForSingleObjectEx (Address: 0x1800a8310)
  • WideCharToMultiByte (Address: 0x1800a8168)
  • WriteConsoleW (Address: 0x1800a8250)
  • WriteFile (Address: 0x1800a81c0)