kwpswinappext.dll

Description: kwpswinappext

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23542

Architecture: 64-bit

Operating System: Windows NT

SHA256: 86bbbcc14aa04eb78c26e89e0ba71503

File Size: 1.2 MB

Uploaded At: Dec. 4, 2025, 6:14 a.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x27e0)
  • DllGetActivationFactory (Ordinal: 2, Address: 0x2890)
  • DllGetClassObject (Ordinal: 3, Address: 0x2a80)

Imported DLLs & Functions

api-ms-win-core-winrt-error-l1-1-0.dll
  • RoOriginateError (Address: 0x1800d9490)
  • RoOriginateErrorW (Address: 0x1800d9488)
api-ms-win-core-winrt-string-l1-1-0.dll
  • WindowsGetStringRawBuffer (Address: 0x1800d94a0)
  • WindowsIsStringEmpty (Address: 0x1800d94b0)
  • WindowsStringHasEmbeddedNull (Address: 0x1800d94a8)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1800d9028)
  • AcquireSRWLockShared (Address: 0x1800d9030)
  • AreFileApisANSI (Address: 0x1800d9340)
  • CloseHandle (Address: 0x1800d9090)
  • CompareFileTime (Address: 0x1800d90e8)
  • CreateDirectoryW (Address: 0x1800d90f0)
  • CreateEventW (Address: 0x1800d9240)
  • CreateFileW (Address: 0x1800d90f8)
  • CreateProcessW (Address: 0x1800d9210)
  • CreateToolhelp32Snapshot (Address: 0x1800d91b0)
  • DecodePointer (Address: 0x1800d9010)
  • DeleteCriticalSection (Address: 0x1800d90d8)
  • DeleteFileW (Address: 0x1800d9208)
  • EncodePointer (Address: 0x1800d9008)
  • EnterCriticalSection (Address: 0x1800d9228)
  • EnumSystemLocalesW (Address: 0x1800d9450)
  • ExitProcess (Address: 0x1800d9418)
  • ExpandEnvironmentStringsW (Address: 0x1800d9180)
  • FileTimeToSystemTime (Address: 0x1800d9158)
  • FindClose (Address: 0x1800d9100)
  • FindFirstFileExW (Address: 0x1800d9330)
  • FindFirstFileW (Address: 0x1800d9108)
  • FindNextFileW (Address: 0x1800d9110)
  • FlushFileBuffers (Address: 0x1800d9468)
  • FlushInstructionCache (Address: 0x1800d9280)
  • FormatMessageA (Address: 0x1800d9300)
  • FreeEnvironmentStringsW (Address: 0x1800d92c8)
  • FreeLibrary (Address: 0x1800d91a0)
  • GetACP (Address: 0x1800d92e8)
  • GetCommandLineA (Address: 0x1800d92d8)
  • GetCommandLineW (Address: 0x1800d91c8)
  • GetCompressedFileSizeW (Address: 0x1800d9238)
  • GetConsoleCP (Address: 0x1800d9470)
  • GetConsoleMode (Address: 0x1800d9458)
  • GetCPInfo (Address: 0x1800d9368)
  • GetCurrentProcess (Address: 0x1800d9190)
  • GetCurrentProcessId (Address: 0x1800d9038)
  • GetCurrentThread (Address: 0x1800d9098)
  • GetCurrentThreadId (Address: 0x1800d9040)
  • GetDriveTypeW (Address: 0x1800d9080)
  • GetEnvironmentStringsW (Address: 0x1800d92d0)
  • GetEnvironmentVariableW (Address: 0x1800d91f8)
  • GetFileAttributesExW (Address: 0x1800d9120)
  • GetFileAttributesW (Address: 0x1800d9118)
  • GetFileInformationByHandleEx (Address: 0x1800d9348)
  • GetFileSizeEx (Address: 0x1800d9128)
  • GetFileType (Address: 0x1800d9428)
  • GetLastError (Address: 0x1800d90c8)
  • GetLocaleInfoW (Address: 0x1800d9438)
  • GetLocalTime (Address: 0x1800d9070)
  • GetLongPathNameW (Address: 0x1800d9220)
  • GetModuleFileNameW (Address: 0x1800d91d0)
  • GetModuleHandleExW (Address: 0x1800d9410)
  • GetModuleHandleW (Address: 0x1800d90a8)
  • GetOEMCP (Address: 0x1800d92e0)
  • GetPrivateProfileIntW (Address: 0x1800d91e0)
  • GetPrivateProfileStringW (Address: 0x1800d91e8)
  • GetProcAddress (Address: 0x1800d90b0)
  • GetProcessHeap (Address: 0x1800d9068)
  • GetStartupInfoW (Address: 0x1800d93b8)
  • GetStdHandle (Address: 0x1800d9420)
  • GetStringTypeW (Address: 0x1800d9308)
  • GetSystemDirectoryW (Address: 0x1800d9088)
  • GetSystemInfo (Address: 0x1800d92f8)
  • GetSystemTime (Address: 0x1800d9148)
  • GetSystemTimeAsFileTime (Address: 0x1800d9360)
  • GetThreadContext (Address: 0x1800d9270)
  • GetTickCount (Address: 0x1800d9078)
  • GetUserDefaultLCID (Address: 0x1800d9448)
  • GetUserDefaultUILanguage (Address: 0x1800d91f0)
  • HeapAlloc (Address: 0x1800d9048)
  • HeapFree (Address: 0x1800d9058)
  • HeapReAlloc (Address: 0x1800d9050)
  • HeapSize (Address: 0x1800d9060)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800d90d0)
  • InitializeCriticalSectionEx (Address: 0x1800d9320)
  • InitializeSListHead (Address: 0x1800d9388)
  • InitializeSRWLock (Address: 0x1800d9318)
  • InterlockedFlushSList (Address: 0x1800d93e8)
  • InterlockedPushEntrySList (Address: 0x1800d93e0)
  • IsDebuggerPresent (Address: 0x1800d9370)
  • IsProcessorFeaturePresent (Address: 0x1800d93c0)
  • IsValidCodePage (Address: 0x1800d92f0)
  • IsValidLocale (Address: 0x1800d9440)
  • LCMapStringEx (Address: 0x1800d9358)
  • LCMapStringW (Address: 0x1800d9430)
  • LeaveCriticalSection (Address: 0x1800d9230)
  • LoadLibraryExA (Address: 0x1800d92a8)
  • LoadLibraryExW (Address: 0x1800d92b0)
  • LoadLibraryW (Address: 0x1800d90e0)
  • LocalFree (Address: 0x1800d9310)
  • lstrlenW (Address: 0x1800d91d8)
  • MultiByteToWideChar (Address: 0x1800d9168)
  • OpenProcess (Address: 0x1800d90a0)
  • OutputDebugStringA (Address: 0x1800d9248)
  • OutputDebugStringW (Address: 0x1800d9000)
  • Process32FirstW (Address: 0x1800d91b8)
  • Process32NextW (Address: 0x1800d91c0)
  • ProcessIdToSessionId (Address: 0x1800d9198)
  • QueryFullProcessImageNameW (Address: 0x1800d90b8)
  • QueryPerformanceCounter (Address: 0x1800d9250)
  • QueryPerformanceFrequency (Address: 0x1800d9258)
  • RaiseException (Address: 0x1800d90c0)
  • ReadConsoleW (Address: 0x1800d9460)
  • ReadFile (Address: 0x1800d9130)
  • ReleaseSRWLockExclusive (Address: 0x1800d9018)
  • ReleaseSRWLockShared (Address: 0x1800d9020)
  • ResetEvent (Address: 0x1800d9380)
  • ResumeThread (Address: 0x1800d9268)
  • RtlCaptureContext (Address: 0x1800d9390)
  • RtlLookupFunctionEntry (Address: 0x1800d9398)
  • RtlPcToFileHeader (Address: 0x1800d93d8)
  • RtlUnwind (Address: 0x1800d9478)
  • RtlUnwindEx (Address: 0x1800d93d0)
  • RtlVirtualUnwind (Address: 0x1800d93a0)
  • SetEndOfFile (Address: 0x1800d9338)
  • SetEnvironmentVariableW (Address: 0x1800d9200)
  • SetEvent (Address: 0x1800d9378)
  • SetFilePointerEx (Address: 0x1800d9138)
  • SetLastError (Address: 0x1800d9218)
  • SetStdHandle (Address: 0x1800d92c0)
  • SetThreadContext (Address: 0x1800d9278)
  • SetUnhandledExceptionFilter (Address: 0x1800d93b0)
  • Sleep (Address: 0x1800d9188)
  • SuspendThread (Address: 0x1800d9260)
  • SystemTimeToFileTime (Address: 0x1800d9160)
  • SystemTimeToTzSpecificLocalTime (Address: 0x1800d9150)
  • TerminateProcess (Address: 0x1800d93c8)
  • TlsAlloc (Address: 0x1800d93f0)
  • TlsFree (Address: 0x1800d9408)
  • TlsGetValue (Address: 0x1800d93f8)
  • TlsSetValue (Address: 0x1800d9400)
  • TryEnterCriticalSection (Address: 0x1800d9328)
  • UnhandledExceptionFilter (Address: 0x1800d93a8)
  • VerifyVersionInfoW (Address: 0x1800d91a8)
  • VerSetConditionMask (Address: 0x1800d9178)
  • VirtualAlloc (Address: 0x1800d9288)
  • VirtualFree (Address: 0x1800d9298)
  • VirtualProtect (Address: 0x1800d9290)
  • VirtualQuery (Address: 0x1800d92a0)
  • WaitForSingleObjectEx (Address: 0x1800d9350)
  • WideCharToMultiByte (Address: 0x1800d9170)
  • WriteConsoleW (Address: 0x1800d92b8)
  • WriteFile (Address: 0x1800d9140)