pdfwspv.dll

Description:

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.9.0.23602

Architecture: 32-bit

Operating System: Windows NT

SHA256: f58ae12c0fdfd7685985bc96d871a962

File Size: 401.5 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 13

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • EntryRegisterDllPoint (Ordinal: 1, Address: 0x35c0)
  • EntryUnRegisterDllPoint (Ordinal: 2, Address: 0x35d0)
  • DllCanUnloadNow (Ordinal: 3, Address: 0x7050)
  • DllGetClassObject (Ordinal: 4, Address: 0x7070)
  • DllRegisterServer (Ordinal: 5, Address: 0x7460)
  • DllUnregisterServer (Ordinal: 6, Address: 0x7f30)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x100400fc)
  • CloseHandle (Address: 0x10040010)
  • CreateEventW (Address: 0x10040158)
  • CreateFileW (Address: 0x10040004)
  • CreateProcessW (Address: 0x100400b8)
  • CreateToolhelp32Snapshot (Address: 0x100400d4)
  • DecodePointer (Address: 0x1004000c)
  • DeleteCriticalSection (Address: 0x10040040)
  • DeleteFileW (Address: 0x100400b4)
  • EncodePointer (Address: 0x10040128)
  • EnterCriticalSection (Address: 0x10040034)
  • EnumSystemLocalesW (Address: 0x1004019c)
  • ExitProcess (Address: 0x10040180)
  • ExpandEnvironmentStringsW (Address: 0x100400c8)
  • FindClose (Address: 0x1004010c)
  • FindFirstFileExW (Address: 0x10040110)
  • FindNextFileW (Address: 0x10040114)
  • FindResourceExW (Address: 0x10040048)
  • FindResourceW (Address: 0x10040070)
  • FlushFileBuffers (Address: 0x100401a0)
  • FreeEnvironmentStringsW (Address: 0x100401c8)
  • FreeLibrary (Address: 0x1004004c)
  • GetACP (Address: 0x100401b8)
  • GetCommandLineA (Address: 0x100401c0)
  • GetCommandLineW (Address: 0x100400c0)
  • GetConsoleCP (Address: 0x100401a4)
  • GetConsoleMode (Address: 0x100401a8)
  • GetCPInfo (Address: 0x10040130)
  • GetCurrentProcess (Address: 0x10040094)
  • GetCurrentProcessId (Address: 0x10040098)
  • GetCurrentThread (Address: 0x1004009c)
  • GetCurrentThreadId (Address: 0x100400a0)
  • GetEnvironmentStringsW (Address: 0x100401c4)
  • GetEnvironmentVariableW (Address: 0x100400ac)
  • GetFileSizeEx (Address: 0x100401ac)
  • GetFileType (Address: 0x10040188)
  • GetLastError (Address: 0x10040018)
  • GetLocaleInfoW (Address: 0x10040190)
  • GetLongPathNameW (Address: 0x100400cc)
  • GetModuleFileNameW (Address: 0x10040050)
  • GetModuleHandleExW (Address: 0x10040058)
  • GetModuleHandleW (Address: 0x10040054)
  • GetOEMCP (Address: 0x100401bc)
  • GetProcAddress (Address: 0x1004005c)
  • GetProcessHeap (Address: 0x10040030)
  • GetStartupInfoW (Address: 0x1004015c)
  • GetStdHandle (Address: 0x10040184)
  • GetStringTypeW (Address: 0x10040108)
  • GetSystemDirectoryW (Address: 0x10040044)
  • GetSystemInfo (Address: 0x100400e4)
  • GetSystemTimeAsFileTime (Address: 0x10040124)
  • GetSystemWow64DirectoryW (Address: 0x100400bc)
  • GetThreadLocale (Address: 0x10040088)
  • GetUserDefaultLCID (Address: 0x10040198)
  • HeapAlloc (Address: 0x10040020)
  • HeapDestroy (Address: 0x1004001c)
  • HeapFree (Address: 0x10040028)
  • HeapReAlloc (Address: 0x10040024)
  • HeapSize (Address: 0x1004002c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1004003c)
  • InitializeCriticalSectionEx (Address: 0x10040100)
  • InitializeSListHead (Address: 0x10040160)
  • InitializeSRWLock (Address: 0x100400f4)
  • InterlockedFlushSList (Address: 0x10040168)
  • IsDebuggerPresent (Address: 0x10040134)
  • IsProcessorFeaturePresent (Address: 0x10040148)
  • IsValidCodePage (Address: 0x100401b4)
  • IsValidLocale (Address: 0x10040194)
  • LCMapStringEx (Address: 0x1004012c)
  • LCMapStringW (Address: 0x1004018c)
  • LeaveCriticalSection (Address: 0x10040038)
  • LoadLibraryExA (Address: 0x100400f0)
  • LoadLibraryExW (Address: 0x10040060)
  • LoadLibraryW (Address: 0x10040074)
  • LoadResource (Address: 0x10040064)
  • LockResource (Address: 0x10040068)
  • lstrcmpiW (Address: 0x10040078)
  • lstrlenW (Address: 0x100400a8)
  • MultiByteToWideChar (Address: 0x10040084)
  • OpenProcess (Address: 0x100400a4)
  • OutputDebugStringW (Address: 0x10040138)
  • Process32FirstW (Address: 0x100400d8)
  • Process32NextW (Address: 0x100400dc)
  • ProcessIdToSessionId (Address: 0x100400d0)
  • QueryPerformanceCounter (Address: 0x10040120)
  • RaiseException (Address: 0x10040014)
  • ReadConsoleW (Address: 0x100401b0)
  • ReadFile (Address: 0x1004017c)
  • ReleaseSRWLockExclusive (Address: 0x100400f8)
  • ResetEvent (Address: 0x10040150)
  • RtlUnwind (Address: 0x10040164)
  • SetDllDirectoryW (Address: 0x1004007c)
  • SetEndOfFile (Address: 0x10040118)
  • SetEnvironmentVariableW (Address: 0x100400b0)
  • SetEvent (Address: 0x1004014c)
  • SetFilePointerEx (Address: 0x1004011c)
  • SetLastError (Address: 0x10040090)
  • SetStdHandle (Address: 0x100400e0)
  • SetThreadLocale (Address: 0x1004008c)
  • SetUnhandledExceptionFilter (Address: 0x10040140)
  • SizeofResource (Address: 0x1004006c)
  • TerminateProcess (Address: 0x10040144)
  • TlsAlloc (Address: 0x1004016c)
  • TlsFree (Address: 0x10040178)
  • TlsGetValue (Address: 0x10040170)
  • TlsSetValue (Address: 0x10040174)
  • TryEnterCriticalSection (Address: 0x10040104)
  • UnhandledExceptionFilter (Address: 0x1004013c)
  • VerifyVersionInfoW (Address: 0x10040080)
  • VerSetConditionMask (Address: 0x10040000)
  • VirtualProtect (Address: 0x100400e8)
  • VirtualQuery (Address: 0x100400ec)
  • WaitForSingleObjectEx (Address: 0x10040154)
  • WideCharToMultiByte (Address: 0x100400c4)
  • WriteConsoleW (Address: 0x100401cc)
  • WriteFile (Address: 0x10040008)