pdfwspv.dll
Description:
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.9.0.23602
Architecture: 32-bit
Operating System: Windows NT
SHA256: f58ae12c0fdfd7685985bc96d871a962
File Size: 401.5 KB
Uploaded At: Dec. 4, 2025, 6:17 a.m.
Views: 13
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- EntryRegisterDllPoint (Ordinal: 1, Address: 0x35c0)
- EntryUnRegisterDllPoint (Ordinal: 2, Address: 0x35d0)
- DllCanUnloadNow (Ordinal: 3, Address: 0x7050)
- DllGetClassObject (Ordinal: 4, Address: 0x7070)
- DllRegisterServer (Ordinal: 5, Address: 0x7460)
- DllUnregisterServer (Ordinal: 6, Address: 0x7f30)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x100400fc)
- CloseHandle (Address: 0x10040010)
- CreateEventW (Address: 0x10040158)
- CreateFileW (Address: 0x10040004)
- CreateProcessW (Address: 0x100400b8)
- CreateToolhelp32Snapshot (Address: 0x100400d4)
- DecodePointer (Address: 0x1004000c)
- DeleteCriticalSection (Address: 0x10040040)
- DeleteFileW (Address: 0x100400b4)
- EncodePointer (Address: 0x10040128)
- EnterCriticalSection (Address: 0x10040034)
- EnumSystemLocalesW (Address: 0x1004019c)
- ExitProcess (Address: 0x10040180)
- ExpandEnvironmentStringsW (Address: 0x100400c8)
- FindClose (Address: 0x1004010c)
- FindFirstFileExW (Address: 0x10040110)
- FindNextFileW (Address: 0x10040114)
- FindResourceExW (Address: 0x10040048)
- FindResourceW (Address: 0x10040070)
- FlushFileBuffers (Address: 0x100401a0)
- FreeEnvironmentStringsW (Address: 0x100401c8)
- FreeLibrary (Address: 0x1004004c)
- GetACP (Address: 0x100401b8)
- GetCommandLineA (Address: 0x100401c0)
- GetCommandLineW (Address: 0x100400c0)
- GetConsoleCP (Address: 0x100401a4)
- GetConsoleMode (Address: 0x100401a8)
- GetCPInfo (Address: 0x10040130)
- GetCurrentProcess (Address: 0x10040094)
- GetCurrentProcessId (Address: 0x10040098)
- GetCurrentThread (Address: 0x1004009c)
- GetCurrentThreadId (Address: 0x100400a0)
- GetEnvironmentStringsW (Address: 0x100401c4)
- GetEnvironmentVariableW (Address: 0x100400ac)
- GetFileSizeEx (Address: 0x100401ac)
- GetFileType (Address: 0x10040188)
- GetLastError (Address: 0x10040018)
- GetLocaleInfoW (Address: 0x10040190)
- GetLongPathNameW (Address: 0x100400cc)
- GetModuleFileNameW (Address: 0x10040050)
- GetModuleHandleExW (Address: 0x10040058)
- GetModuleHandleW (Address: 0x10040054)
- GetOEMCP (Address: 0x100401bc)
- GetProcAddress (Address: 0x1004005c)
- GetProcessHeap (Address: 0x10040030)
- GetStartupInfoW (Address: 0x1004015c)
- GetStdHandle (Address: 0x10040184)
- GetStringTypeW (Address: 0x10040108)
- GetSystemDirectoryW (Address: 0x10040044)
- GetSystemInfo (Address: 0x100400e4)
- GetSystemTimeAsFileTime (Address: 0x10040124)
- GetSystemWow64DirectoryW (Address: 0x100400bc)
- GetThreadLocale (Address: 0x10040088)
- GetUserDefaultLCID (Address: 0x10040198)
- HeapAlloc (Address: 0x10040020)
- HeapDestroy (Address: 0x1004001c)
- HeapFree (Address: 0x10040028)
- HeapReAlloc (Address: 0x10040024)
- HeapSize (Address: 0x1004002c)
- InitializeCriticalSectionAndSpinCount (Address: 0x1004003c)
- InitializeCriticalSectionEx (Address: 0x10040100)
- InitializeSListHead (Address: 0x10040160)
- InitializeSRWLock (Address: 0x100400f4)
- InterlockedFlushSList (Address: 0x10040168)
- IsDebuggerPresent (Address: 0x10040134)
- IsProcessorFeaturePresent (Address: 0x10040148)
- IsValidCodePage (Address: 0x100401b4)
- IsValidLocale (Address: 0x10040194)
- LCMapStringEx (Address: 0x1004012c)
- LCMapStringW (Address: 0x1004018c)
- LeaveCriticalSection (Address: 0x10040038)
- LoadLibraryExA (Address: 0x100400f0)
- LoadLibraryExW (Address: 0x10040060)
- LoadLibraryW (Address: 0x10040074)
- LoadResource (Address: 0x10040064)
- LockResource (Address: 0x10040068)
- lstrcmpiW (Address: 0x10040078)
- lstrlenW (Address: 0x100400a8)
- MultiByteToWideChar (Address: 0x10040084)
- OpenProcess (Address: 0x100400a4)
- OutputDebugStringW (Address: 0x10040138)
- Process32FirstW (Address: 0x100400d8)
- Process32NextW (Address: 0x100400dc)
- ProcessIdToSessionId (Address: 0x100400d0)
- QueryPerformanceCounter (Address: 0x10040120)
- RaiseException (Address: 0x10040014)
- ReadConsoleW (Address: 0x100401b0)
- ReadFile (Address: 0x1004017c)
- ReleaseSRWLockExclusive (Address: 0x100400f8)
- ResetEvent (Address: 0x10040150)
- RtlUnwind (Address: 0x10040164)
- SetDllDirectoryW (Address: 0x1004007c)
- SetEndOfFile (Address: 0x10040118)
- SetEnvironmentVariableW (Address: 0x100400b0)
- SetEvent (Address: 0x1004014c)
- SetFilePointerEx (Address: 0x1004011c)
- SetLastError (Address: 0x10040090)
- SetStdHandle (Address: 0x100400e0)
- SetThreadLocale (Address: 0x1004008c)
- SetUnhandledExceptionFilter (Address: 0x10040140)
- SizeofResource (Address: 0x1004006c)
- TerminateProcess (Address: 0x10040144)
- TlsAlloc (Address: 0x1004016c)
- TlsFree (Address: 0x10040178)
- TlsGetValue (Address: 0x10040170)
- TlsSetValue (Address: 0x10040174)
- TryEnterCriticalSection (Address: 0x10040104)
- UnhandledExceptionFilter (Address: 0x1004013c)
- VerifyVersionInfoW (Address: 0x10040080)
- VerSetConditionMask (Address: 0x10040000)
- VirtualProtect (Address: 0x100400e8)
- VirtualQuery (Address: 0x100400ec)
- WaitForSingleObjectEx (Address: 0x10040154)
- WideCharToMultiByte (Address: 0x100400c4)
- WriteConsoleW (Address: 0x100401cc)
- WriteFile (Address: 0x10040008)