kyunhook64.dll

Description: kyunhook

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23542

Architecture: 64-bit

Operating System: Windows NT

SHA256: 373d08e15e38b3c0c7a76f5344a72e2c

File Size: 861.0 KB

Uploaded At: Dec. 4, 2025, 6:13 a.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1590)
  • DllGetClassObject (Ordinal: 2, Address: 0x15a0)
  • DllMain (Ordinal: 3, Address: 0x1660)
  • DllRegisterServer (Ordinal: 4, Address: 0x1b70)
  • DllUnregisterServer (Ordinal: 5, Address: 0x1d30)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18009d288)
  • CloseHandle (Address: 0x18009d050)
  • CompareStringEx (Address: 0x18009d328)
  • CompareStringW (Address: 0x18009d438)
  • CreateDirectoryW (Address: 0x18009d088)
  • CreateEventW (Address: 0x18009d348)
  • CreateFileMappingW (Address: 0x18009d138)
  • CreateFileW (Address: 0x18009d090)
  • CreateMutexW (Address: 0x18009d108)
  • CreateThread (Address: 0x18009d3f8)
  • CreateToolhelp32Snapshot (Address: 0x18009d1b8)
  • DecodePointer (Address: 0x18009d1d8)
  • DeleteCriticalSection (Address: 0x18009d1f0)
  • DeleteFileW (Address: 0x18009d098)
  • DisableThreadLibraryCalls (Address: 0x18009d008)
  • EncodePointer (Address: 0x18009d308)
  • EnterCriticalSection (Address: 0x18009d290)
  • EnumSystemLocalesW (Address: 0x18009d460)
  • ExitProcess (Address: 0x18009d418)
  • ExitThread (Address: 0x18009d400)
  • ExpandEnvironmentStringsW (Address: 0x18009d040)
  • FileTimeToSystemTime (Address: 0x18009d258)
  • FindClose (Address: 0x18009d0a0)
  • FindFirstFileExW (Address: 0x18009d2f8)
  • FindFirstFileW (Address: 0x18009d0a8)
  • FindNextFileW (Address: 0x18009d0b0)
  • FlushFileBuffers (Address: 0x18009d470)
  • FlushInstructionCache (Address: 0x18009d218)
  • FreeEnvironmentStringsW (Address: 0x18009d4d8)
  • FreeLibrary (Address: 0x18009d190)
  • FreeLibraryAndExitThread (Address: 0x18009d408)
  • GetACP (Address: 0x18009d4b8)
  • GetCommandLineA (Address: 0x18009d4c8)
  • GetCommandLineW (Address: 0x18009d080)
  • GetConsoleCP (Address: 0x18009d478)
  • GetConsoleMode (Address: 0x18009d480)
  • GetCPInfo (Address: 0x18009d330)
  • GetCurrentDirectoryW (Address: 0x18009d2f0)
  • GetCurrentProcess (Address: 0x18009d1a0)
  • GetCurrentProcessId (Address: 0x18009d118)
  • GetCurrentThread (Address: 0x18009d018)
  • GetCurrentThreadId (Address: 0x18009d120)
  • GetDateFormatW (Address: 0x18009d428)
  • GetDiskFreeSpaceExW (Address: 0x18009d0b8)
  • GetDriveTypeW (Address: 0x18009d3d8)
  • GetEnvironmentStringsW (Address: 0x18009d4d0)
  • GetExitCodeThread (Address: 0x18009d178)
  • GetFileAttributesW (Address: 0x18009d0c0)
  • GetFileInformationByHandle (Address: 0x18009d240)
  • GetFileSize (Address: 0x18009d248)
  • GetFileSizeEx (Address: 0x18009d488)
  • GetFileType (Address: 0x18009d3e0)
  • GetFullPathNameW (Address: 0x18009d048)
  • GetLastError (Address: 0x18009d000)
  • GetLocaleInfoEx (Address: 0x18009d320)
  • GetLocaleInfoW (Address: 0x18009d448)
  • GetLocalTime (Address: 0x18009d170)
  • GetModuleFileNameW (Address: 0x18009d010)
  • GetModuleHandleExW (Address: 0x18009d410)
  • GetModuleHandleW (Address: 0x18009d020)
  • GetOEMCP (Address: 0x18009d4c0)
  • GetProcAddress (Address: 0x18009d028)
  • GetProcessHeap (Address: 0x18009d068)
  • GetStartupInfoW (Address: 0x18009d390)
  • GetStdHandle (Address: 0x18009d420)
  • GetStringTypeW (Address: 0x18009d2e8)
  • GetSystemDirectoryW (Address: 0x18009d188)
  • GetSystemInfo (Address: 0x18009d270)
  • GetSystemTimeAsFileTime (Address: 0x18009d318)
  • GetThreadContext (Address: 0x18009d208)
  • GetTickCount (Address: 0x18009d250)
  • GetTimeFormatW (Address: 0x18009d430)
  • GetTimeZoneInformation (Address: 0x18009d498)
  • GetUserDefaultLCID (Address: 0x18009d458)
  • HeapAlloc (Address: 0x18009d058)
  • HeapFree (Address: 0x18009d060)
  • HeapReAlloc (Address: 0x18009d4a8)
  • HeapSize (Address: 0x18009d4e0)
  • InitializeConditionVariable (Address: 0x18009d2c0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18009d1e8)
  • InitializeCriticalSectionEx (Address: 0x18009d2a0)
  • InitializeSListHead (Address: 0x18009d398)
  • InitializeSRWLock (Address: 0x18009d278)
  • InterlockedFlushSList (Address: 0x18009d3b0)
  • IsDebuggerPresent (Address: 0x18009d388)
  • IsProcessorFeaturePresent (Address: 0x18009d380)
  • IsValidCodePage (Address: 0x18009d4b0)
  • IsValidLocale (Address: 0x18009d450)
  • LCMapStringEx (Address: 0x18009d310)
  • LCMapStringW (Address: 0x18009d440)
  • LeaveCriticalSection (Address: 0x18009d298)
  • LoadLibraryExA (Address: 0x18009d230)
  • LoadLibraryExW (Address: 0x18009d238)
  • LoadLibraryW (Address: 0x18009d030)
  • lstrlenW (Address: 0x18009d070)
  • MapViewOfFile (Address: 0x18009d148)
  • MapViewOfFileEx (Address: 0x18009d150)
  • MoveFileW (Address: 0x18009d160)
  • MultiByteToWideChar (Address: 0x18009d168)
  • OpenFileMappingW (Address: 0x18009d140)
  • OpenProcess (Address: 0x18009d1b0)
  • OutputDebugStringW (Address: 0x18009d0f0)
  • PeekNamedPipe (Address: 0x18009d3e8)
  • Process32FirstW (Address: 0x18009d1c0)
  • Process32NextW (Address: 0x18009d1c8)
  • ProcessIdToSessionId (Address: 0x18009d1a8)
  • QueryPerformanceCounter (Address: 0x18009d2b0)
  • RaiseException (Address: 0x18009d1e0)
  • ReadConsoleW (Address: 0x18009d490)
  • ReadFile (Address: 0x18009d0c8)
  • ReleaseMutex (Address: 0x18009d0f8)
  • ReleaseSRWLockExclusive (Address: 0x18009d280)
  • RemoveDirectoryW (Address: 0x18009d0d0)
  • ResetEvent (Address: 0x18009d340)
  • ResumeThread (Address: 0x18009d200)
  • RtlCaptureContext (Address: 0x18009d350)
  • RtlCaptureStackBackTrace (Address: 0x18009d038)
  • RtlLookupFunctionEntry (Address: 0x18009d358)
  • RtlPcToFileHeader (Address: 0x18009d3a0)
  • RtlUnwind (Address: 0x18009d4e8)
  • RtlUnwindEx (Address: 0x18009d3a8)
  • RtlVirtualUnwind (Address: 0x18009d360)
  • SetEndOfFile (Address: 0x18009d0d8)
  • SetEnvironmentVariableW (Address: 0x18009d4a0)
  • SetEvent (Address: 0x18009d338)
  • SetFilePointer (Address: 0x18009d0e0)
  • SetFilePointerEx (Address: 0x18009d300)
  • SetLastError (Address: 0x18009d1d0)
  • SetStdHandle (Address: 0x18009d468)
  • SetThreadContext (Address: 0x18009d210)
  • SetUnhandledExceptionFilter (Address: 0x18009d370)
  • Sleep (Address: 0x18009d110)
  • SleepConditionVariableCS (Address: 0x18009d2d8)
  • SleepConditionVariableSRW (Address: 0x18009d2e0)
  • SuspendThread (Address: 0x18009d1f8)
  • SystemTimeToFileTime (Address: 0x18009d260)
  • SystemTimeToTzSpecificLocalTime (Address: 0x18009d3f0)
  • TerminateProcess (Address: 0x18009d378)
  • TlsAlloc (Address: 0x18009d3b8)
  • TlsFree (Address: 0x18009d3d0)
  • TlsGetValue (Address: 0x18009d3c0)
  • TlsSetValue (Address: 0x18009d3c8)
  • TryEnterCriticalSection (Address: 0x18009d2a8)
  • UnhandledExceptionFilter (Address: 0x18009d368)
  • UnmapViewOfFile (Address: 0x18009d158)
  • VerifyVersionInfoW (Address: 0x18009d198)
  • VerSetConditionMask (Address: 0x18009d180)
  • VirtualAlloc (Address: 0x18009d128)
  • VirtualFree (Address: 0x18009d130)
  • VirtualProtect (Address: 0x18009d220)
  • VirtualQuery (Address: 0x18009d228)
  • WaitForSingleObject (Address: 0x18009d100)
  • WaitForSingleObjectEx (Address: 0x18009d2b8)
  • WakeAllConditionVariable (Address: 0x18009d2d0)
  • WakeConditionVariable (Address: 0x18009d2c8)
  • WideCharToMultiByte (Address: 0x18009d078)
  • WriteConsoleW (Address: 0x18009d268)
  • WriteFile (Address: 0x18009d0e8)