w11mdp.dll

Description:

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.1.0.23125

Architecture: 32-bit

Operating System: Windows NT

SHA256: b9bdcef215af146edf6e96eebeeab72f

File Size: 419.5 KB

Uploaded At: Dec. 4, 2025, 6:11 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx, OpenProcess

Exported Functions

  • Detours_Func (Ordinal: 1, Address: 0x8780)
  • SetUserChoice (Ordinal: 2, Address: 0xc110)

Imported DLLs & Functions

KERNEL32.dll
  • ChangeTimerQueueTimer (Address: 0x10042074)
  • CloseHandle (Address: 0x10042000)
  • CompareStringEx (Address: 0x100421a0)
  • CreateEventW (Address: 0x10042024)
  • CreateFileMappingW (Address: 0x10042060)
  • CreateFileW (Address: 0x100420cc)
  • CreateProcessW (Address: 0x10042044)
  • CreateTimerQueueTimer (Address: 0x10042070)
  • CreateToolhelp32Snapshot (Address: 0x100420b0)
  • DecodePointer (Address: 0x100420ec)
  • DeleteCriticalSection (Address: 0x10042100)
  • DeleteTimerQueueTimer (Address: 0x10042078)
  • DuplicateHandle (Address: 0x10042004)
  • EncodePointer (Address: 0x1004219c)
  • EnterCriticalSection (Address: 0x10042180)
  • EnumSystemLocalesW (Address: 0x100421fc)
  • ExitProcess (Address: 0x10042034)
  • FileTimeToSystemTime (Address: 0x100420a0)
  • FindClose (Address: 0x1004218c)
  • FindFirstFileExW (Address: 0x10042190)
  • FindNextFileW (Address: 0x10042194)
  • FindResourceExW (Address: 0x10042110)
  • FindResourceW (Address: 0x10042120)
  • FlushFileBuffers (Address: 0x10042224)
  • FlushInstructionCache (Address: 0x10042150)
  • FormatMessageW (Address: 0x10042124)
  • FreeEnvironmentStringsW (Address: 0x10042220)
  • FreeLibrary (Address: 0x10042080)
  • GetACP (Address: 0x10042210)
  • GetCommandLineA (Address: 0x10042218)
  • GetCommandLineW (Address: 0x1004212c)
  • GetConsoleCP (Address: 0x1004222c)
  • GetConsoleMode (Address: 0x10042208)
  • GetCPInfo (Address: 0x100421a4)
  • GetCurrentProcess (Address: 0x1004202c)
  • GetCurrentProcessId (Address: 0x10042030)
  • GetCurrentThread (Address: 0x1004203c)
  • GetCurrentThreadId (Address: 0x100420b4)
  • GetEnvironmentStringsW (Address: 0x1004221c)
  • GetEnvironmentVariableW (Address: 0x10042160)
  • GetExitCodeProcess (Address: 0x10042168)
  • GetFileSizeEx (Address: 0x1004220c)
  • GetFileType (Address: 0x10042204)
  • GetLastError (Address: 0x10042008)
  • GetLocaleInfoW (Address: 0x100421f0)
  • GetModuleFileNameW (Address: 0x10042084)
  • GetModuleHandleExW (Address: 0x100421e8)
  • GetModuleHandleW (Address: 0x10042088)
  • GetOEMCP (Address: 0x10042214)
  • GetProcAddress (Address: 0x1004208c)
  • GetProcessHeap (Address: 0x10042018)
  • GetStartupInfoW (Address: 0x10042048)
  • GetStdHandle (Address: 0x10042200)
  • GetStringTypeW (Address: 0x1004217c)
  • GetSystemDirectoryW (Address: 0x10042130)
  • GetSystemInfo (Address: 0x100420c4)
  • GetSystemTime (Address: 0x1004204c)
  • GetSystemTimeAsFileTime (Address: 0x100421b0)
  • GetSystemWow64DirectoryW (Address: 0x10042134)
  • GetThreadContext (Address: 0x10042148)
  • GetThreadLocale (Address: 0x10042128)
  • GetTickCount (Address: 0x10042050)
  • GetUserDefaultLCID (Address: 0x100421f8)
  • GetWindowsDirectoryW (Address: 0x10042054)
  • GlobalAlloc (Address: 0x100420d4)
  • GlobalFree (Address: 0x100420e0)
  • GlobalLock (Address: 0x100420dc)
  • GlobalUnlock (Address: 0x100420d8)
  • HeapAlloc (Address: 0x10042010)
  • HeapDestroy (Address: 0x100420f0)
  • HeapFree (Address: 0x10042014)
  • HeapReAlloc (Address: 0x100420f4)
  • HeapSize (Address: 0x100420f8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100420fc)
  • InitializeCriticalSectionEx (Address: 0x10042188)
  • InitializeSListHead (Address: 0x100421c8)
  • InterlockedFlushSList (Address: 0x100421d4)
  • IsDebuggerPresent (Address: 0x100420d0)
  • IsProcessorFeaturePresent (Address: 0x100421c4)
  • IsValidCodePage (Address: 0x100420e8)
  • IsValidLocale (Address: 0x100421f4)
  • IsWow64Process (Address: 0x1004207c)
  • LCMapStringEx (Address: 0x100421a8)
  • LCMapStringW (Address: 0x100421ec)
  • LeaveCriticalSection (Address: 0x10042184)
  • LoadLibraryExA (Address: 0x10042170)
  • LoadLibraryExW (Address: 0x10042174)
  • LoadLibraryW (Address: 0x10042090)
  • LoadResource (Address: 0x10042114)
  • LocalAlloc (Address: 0x10042094)
  • LocalFree (Address: 0x10042098)
  • LockResource (Address: 0x10042118)
  • lstrlenA (Address: 0x100420e4)
  • lstrlenW (Address: 0x1004209c)
  • MapViewOfFile (Address: 0x10042068)
  • MultiByteToWideChar (Address: 0x100420a8)
  • OpenFileMappingW (Address: 0x10042064)
  • OpenProcess (Address: 0x100420b8)
  • OutputDebugStringA (Address: 0x10042164)
  • OutputDebugStringW (Address: 0x100421cc)
  • Process32FirstW (Address: 0x1004213c)
  • Process32NextW (Address: 0x10042140)
  • ProcessIdToSessionId (Address: 0x10042138)
  • QueryPerformanceCounter (Address: 0x100421ac)
  • RaiseException (Address: 0x100420c0)
  • ReadProcessMemory (Address: 0x1004216c)
  • ResetEvent (Address: 0x100421b4)
  • ResumeThread (Address: 0x10042040)
  • RtlUnwind (Address: 0x100421d0)
  • SetEvent (Address: 0x1004201c)
  • SetFilePointerEx (Address: 0x10042198)
  • SetLastError (Address: 0x1004200c)
  • SetStdHandle (Address: 0x10042178)
  • SetThreadContext (Address: 0x1004214c)
  • SetUnhandledExceptionFilter (Address: 0x100421c0)
  • SizeofResource (Address: 0x1004211c)
  • Sleep (Address: 0x10042028)
  • SuspendThread (Address: 0x10042144)
  • SystemTimeToFileTime (Address: 0x100420a4)
  • TerminateProcess (Address: 0x10042038)
  • TlsAlloc (Address: 0x100421d8)
  • TlsFree (Address: 0x100421e4)
  • TlsGetValue (Address: 0x100421dc)
  • TlsSetValue (Address: 0x100421e0)
  • UnhandledExceptionFilter (Address: 0x100421bc)
  • UnmapViewOfFile (Address: 0x1004206c)
  • VerifyVersionInfoW (Address: 0x100420c8)
  • VerSetConditionMask (Address: 0x100420bc)
  • VirtualAlloc (Address: 0x10042104)
  • VirtualAllocEx (Address: 0x10042058)
  • VirtualFree (Address: 0x10042108)
  • VirtualProtect (Address: 0x10042154)
  • VirtualProtectEx (Address: 0x10042158)
  • VirtualQuery (Address: 0x1004210c)
  • VirtualQueryEx (Address: 0x1004215c)
  • WaitForSingleObject (Address: 0x10042020)
  • WaitForSingleObjectEx (Address: 0x100421b8)
  • WideCharToMultiByte (Address: 0x100420ac)
  • WriteConsoleW (Address: 0x10042230)
  • WriteFile (Address: 0x10042228)
  • WriteProcessMemory (Address: 0x1004205c)