YunShellExt.dll

Description: YunShellExt

Authors: Baidu. All rights reserved.

Version: 7.60.7.104

Architecture: 32-bit

Operating System: Windows

SHA256: 0d05004a0d87843f474a2df51b25b417

File Size: 1.7 MB

Uploaded At: Dec. 4, 2025, 6:15 a.m.

Views: 9

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0xb3d40)
  • DllGetClassObject (Ordinal: 2, Address: 0xb3d60)
  • DllRegisterServer (Ordinal: 3, Address: 0xb3df0)
  • DllUnregisterServer (Ordinal: 4, Address: 0xb3e20)

Imported DLLs & Functions

ADVAPI32.dll
  • AccessCheck (Address: 0x100db02c)
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x100db034)
  • DuplicateToken (Address: 0x100db028)
  • GetNamedSecurityInfoW (Address: 0x100db018)
  • OpenProcessToken (Address: 0x100db030)
  • RegCloseKey (Address: 0x100db024)
  • RegCreateKeyExW (Address: 0x100db014)
  • RegDeleteKeyW (Address: 0x100db010)
  • RegDeleteValueW (Address: 0x100db00c)
  • RegEnumKeyExW (Address: 0x100db008)
  • RegOpenKeyExW (Address: 0x100db020)
  • RegQueryInfoKeyW (Address: 0x100db004)
  • RegQueryValueExW (Address: 0x100db01c)
  • RegSetValueExW (Address: 0x100db000)
GDI32.dll
  • DeleteObject (Address: 0x100db03c)
gdiplus.dll
  • GdipAlloc (Address: 0x100db368)
  • GdipCloneImage (Address: 0x100db364)
  • GdipCreateBitmapFromHICON (Address: 0x100db348)
  • GdipCreateBitmapFromScan0 (Address: 0x100db340)
  • GdipCreateHBITMAPFromBitmap (Address: 0x100db344)
  • GdipDeleteGraphics (Address: 0x100db34c)
  • GdipDisposeImage (Address: 0x100db360)
  • GdipDrawImageRectI (Address: 0x100db350)
  • GdipFree (Address: 0x100db36c)
  • GdipGetImageGraphicsContext (Address: 0x100db35c)
  • GdipGetImageHeight (Address: 0x100db354)
  • GdipGetImageWidth (Address: 0x100db358)
  • GdiplusShutdown (Address: 0x100db374)
  • GdiplusStartup (Address: 0x100db370)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x100db0f4)
  • CloseHandle (Address: 0x100db060)
  • CompareStringW (Address: 0x100db21c)
  • CreateFileA (Address: 0x100db078)
  • CreateFileMappingA (Address: 0x100db114)
  • CreateFileMappingW (Address: 0x100db1fc)
  • CreateFileW (Address: 0x100db0b4)
  • CreateMutexW (Address: 0x100db0bc)
  • CreateProcessW (Address: 0x100db164)
  • CreateThread (Address: 0x100db240)
  • DecodePointer (Address: 0x100db154)
  • DeleteCriticalSection (Address: 0x100db108)
  • DeleteFileA (Address: 0x100db06c)
  • DeleteFileW (Address: 0x100db068)
  • EncodePointer (Address: 0x100db174)
  • EnterCriticalSection (Address: 0x100db0fc)
  • ExitProcess (Address: 0x100db230)
  • ExitThread (Address: 0x100db23c)
  • FindClose (Address: 0x100db13c)
  • FindFirstFileExA (Address: 0x100db1b4)
  • FindFirstFileW (Address: 0x100db140)
  • FindNextFileA (Address: 0x100db1b0)
  • FindResourceExW (Address: 0x100db124)
  • FindResourceW (Address: 0x100db134)
  • FlushFileBuffers (Address: 0x100db1cc)
  • FlushInstructionCache (Address: 0x100db268)
  • FlushViewOfFile (Address: 0x100db07c)
  • FormatMessageA (Address: 0x100db1f8)
  • FormatMessageW (Address: 0x100db094)
  • FreeEnvironmentStringsW (Address: 0x100db194)
  • FreeLibrary (Address: 0x100db1e8)
  • FreeLibraryAndExitThread (Address: 0x100db238)
  • GetACP (Address: 0x100db210)
  • GetCommandLineA (Address: 0x100db1a0)
  • GetCommandLineW (Address: 0x100db19c)
  • GetConsoleCP (Address: 0x100db188)
  • GetConsoleMode (Address: 0x100db1c0)
  • GetCPInfo (Address: 0x100db1a4)
  • GetCurrentProcess (Address: 0x100db160)
  • GetCurrentProcessId (Address: 0x100db1dc)
  • GetCurrentThreadId (Address: 0x100db10c)
  • GetDateFormatW (Address: 0x100db224)
  • GetDiskFreeSpaceA (Address: 0x100db090)
  • GetDiskFreeSpaceW (Address: 0x100db0dc)
  • GetDriveTypeW (Address: 0x100db144)
  • GetEnvironmentStringsW (Address: 0x100db198)
  • GetFileAttributesA (Address: 0x100db088)
  • GetFileAttributesExW (Address: 0x100db084)
  • GetFileAttributesW (Address: 0x100db0b0)
  • GetFileSize (Address: 0x100db1d8)
  • GetFileType (Address: 0x100db1c4)
  • GetFullPathNameA (Address: 0x100db0cc)
  • GetFullPathNameW (Address: 0x100db0e4)
  • GetLastError (Address: 0x100db08c)
  • GetModuleFileNameA (Address: 0x100db22c)
  • GetModuleFileNameW (Address: 0x100db150)
  • GetModuleHandleExW (Address: 0x100db234)
  • GetModuleHandleW (Address: 0x100db138)
  • GetOEMCP (Address: 0x100db1a8)
  • GetProcAddress (Address: 0x100db044)
  • GetProcessHeap (Address: 0x100db1e0)
  • GetStartupInfoW (Address: 0x100db278)
  • GetStdHandle (Address: 0x100db1c8)
  • GetStringTypeW (Address: 0x100db214)
  • GetSystemInfo (Address: 0x100db05c)
  • GetSystemTime (Address: 0x100db1f4)
  • GetSystemTimeAsFileTime (Address: 0x100db1f0)
  • GetTempFileNameW (Address: 0x100db15c)
  • GetTempPathA (Address: 0x100db098)
  • GetTempPathW (Address: 0x100db0c0)
  • GetThreadLocale (Address: 0x100db17c)
  • GetTickCount (Address: 0x100db208)
  • GetTimeFormatW (Address: 0x100db220)
  • GetTimeZoneInformation (Address: 0x100db228)
  • GetVersionExW (Address: 0x100db11c)
  • GetVolumeInformationW (Address: 0x100db148)
  • GetWindowsDirectoryW (Address: 0x100db178)
  • GlobalLock (Address: 0x100db184)
  • HeapAlloc (Address: 0x100db054)
  • HeapCompact (Address: 0x100db050)
  • HeapCreate (Address: 0x100db0ec)
  • HeapDestroy (Address: 0x100db04c)
  • HeapFree (Address: 0x100db0e8)
  • HeapReAlloc (Address: 0x100db064)
  • HeapSize (Address: 0x100db0a4)
  • HeapValidate (Address: 0x100db0a8)
  • InitializeCriticalSection (Address: 0x100db0f8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100db110)
  • InitializeSListHead (Address: 0x100db274)
  • InterlockedFlushSList (Address: 0x100db254)
  • InterlockedPopEntrySList (Address: 0x100db270)
  • InterlockedPushEntrySList (Address: 0x100db26c)
  • IsDebuggerPresent (Address: 0x100db27c)
  • IsProcessorFeaturePresent (Address: 0x100db280)
  • IsValidCodePage (Address: 0x100db1ac)
  • LCMapStringW (Address: 0x100db218)
  • LeaveCriticalSection (Address: 0x100db100)
  • LoadLibraryA (Address: 0x100db074)
  • LoadLibraryExA (Address: 0x100db25c)
  • LoadLibraryExW (Address: 0x100db16c)
  • LoadLibraryW (Address: 0x100db058)
  • LoadResource (Address: 0x100db128)
  • LocalFree (Address: 0x100db1d0)
  • LockFile (Address: 0x100db0d4)
  • LockFileEx (Address: 0x100db1d4)
  • LockResource (Address: 0x100db12c)
  • lstrcmpiW (Address: 0x100db170)
  • MapViewOfFile (Address: 0x100db200)
  • MultiByteToWideChar (Address: 0x100db0a0)
  • OpenFileMappingW (Address: 0x100db120)
  • OpenMutexW (Address: 0x100db118)
  • OutputDebugStringA (Address: 0x100db0d8)
  • OutputDebugStringW (Address: 0x100db080)
  • QueryPerformanceCounter (Address: 0x100db204)
  • RaiseException (Address: 0x100db158)
  • ReadConsoleW (Address: 0x100db1bc)
  • ReadFile (Address: 0x100db0f0)
  • ReleaseMutex (Address: 0x100db20c)
  • RtlUnwind (Address: 0x100db258)
  • SetEndOfFile (Address: 0x100db0c8)
  • SetEnvironmentVariableA (Address: 0x100db190)
  • SetFilePointer (Address: 0x100db0d0)
  • SetFilePointerEx (Address: 0x100db1b8)
  • SetLastError (Address: 0x100db168)
  • SetStdHandle (Address: 0x100db18c)
  • SetThreadLocale (Address: 0x100db180)
  • SetUnhandledExceptionFilter (Address: 0x100db288)
  • SizeofResource (Address: 0x100db130)
  • Sleep (Address: 0x100db09c)
  • SystemTimeToFileTime (Address: 0x100db1e4)
  • TerminateProcess (Address: 0x100db284)
  • TlsAlloc (Address: 0x100db250)
  • TlsFree (Address: 0x100db244)
  • TlsGetValue (Address: 0x100db24c)
  • TlsSetValue (Address: 0x100db248)
  • TryEnterCriticalSection (Address: 0x100db104)
  • UnhandledExceptionFilter (Address: 0x100db28c)
  • UnlockFile (Address: 0x100db048)
  • UnlockFileEx (Address: 0x100db0c4)
  • UnmapViewOfFile (Address: 0x100db0ac)
  • VirtualAlloc (Address: 0x100db264)
  • VirtualFree (Address: 0x100db260)
  • VirtualQuery (Address: 0x100db14c)
  • WaitForSingleObject (Address: 0x100db0b8)
  • WaitForSingleObjectEx (Address: 0x100db070)
  • WideCharToMultiByte (Address: 0x100db1ec)
  • WriteConsoleW (Address: 0x100db290)
  • WriteFile (Address: 0x100db0e0)
ole32.dll
  • CoCreateInstance (Address: 0x100db37c)
  • CoFreeLibrary (Address: 0x100db384)
  • CoLoadLibrary (Address: 0x100db380)
  • CoTaskMemAlloc (Address: 0x100db388)
  • CoTaskMemFree (Address: 0x100db390)
  • CoTaskMemRealloc (Address: 0x100db38c)
  • ReleaseStgMedium (Address: 0x100db398)
  • StringFromGUID2 (Address: 0x100db394)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x100db2b4)
  • LoadTypeLib (Address: 0x100db2b0)
  • RegisterTypeLib (Address: 0x100db2b8)
  • SysAllocString (Address: 0x100db298)
  • SysAllocStringLen (Address: 0x100db2a4)
  • SysFreeString (Address: 0x100db29c)
  • SysStringLen (Address: 0x100db2a0)
  • UnRegisterTypeLib (Address: 0x100db2bc)
  • VariantClear (Address: 0x100db2a8)
  • VarUI4FromStr (Address: 0x100db2ac)
PSAPI.DLL
  • EnumProcesses (Address: 0x100db2c4)
SHELL32.dll
  • DragQueryFileW (Address: 0x100db2d4)
  • SHGetFolderPathW (Address: 0x100db2d0)
  • SHGetSpecialFolderPathW (Address: 0x100db2cc)
SHLWAPI.dll
  • PathFileExistsW (Address: 0x100db2dc)
  • PathIsDirectoryW (Address: 0x100db2e0)
  • StrCmpLogicalW (Address: 0x100db2e4)
USER32.dll
  • CallWindowProcW (Address: 0x100db324)
  • CharNextW (Address: 0x100db2f8)
  • CreateWindowExW (Address: 0x100db330)
  • DefWindowProcW (Address: 0x100db320)
  • DestroyWindow (Address: 0x100db31c)
  • EnableMenuItem (Address: 0x100db2ec)
  • GetClassInfoExW (Address: 0x100db32c)
  • GetWindowLongW (Address: 0x100db300)
  • InsertMenuItemW (Address: 0x100db304)
  • InsertMenuW (Address: 0x100db2f0)
  • IsWindow (Address: 0x100db338)
  • KillTimer (Address: 0x100db30c)
  • LoadCursorW (Address: 0x100db2fc)
  • LoadIconW (Address: 0x100db308)
  • RegisterClassExW (Address: 0x100db328)
  • SendMessageTimeoutW (Address: 0x100db318)
  • SetMenuItemBitmaps (Address: 0x100db334)
  • SetTimer (Address: 0x100db314)
  • SetWindowLongW (Address: 0x100db2f4)
  • UnregisterClassW (Address: 0x100db310)