w11mdp.dll
Description:
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.1.0.23542
Architecture: 32-bit
Operating System: Windows NT
SHA256: 21c5675388a682f553a92ecf9f1f40c7
File Size: 419.0 KB
Uploaded At: Dec. 4, 2025, 6:13 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx, OpenProcess
Exported Functions
- Detours_Func (Ordinal: 1, Address: 0x87e0)
- SetUserChoice (Ordinal: 2, Address: 0xc160)
Imported DLLs & Functions
KERNEL32.dll
- ChangeTimerQueueTimer (Address: 0x10042074)
- CloseHandle (Address: 0x10042000)
- CompareStringEx (Address: 0x100421a0)
- CreateEventW (Address: 0x10042024)
- CreateFileMappingW (Address: 0x10042060)
- CreateFileW (Address: 0x100420cc)
- CreateProcessW (Address: 0x10042044)
- CreateTimerQueueTimer (Address: 0x10042070)
- CreateToolhelp32Snapshot (Address: 0x100420b0)
- DecodePointer (Address: 0x100420ec)
- DeleteCriticalSection (Address: 0x10042100)
- DeleteTimerQueueTimer (Address: 0x10042078)
- DuplicateHandle (Address: 0x10042004)
- EncodePointer (Address: 0x1004219c)
- EnterCriticalSection (Address: 0x10042180)
- EnumSystemLocalesW (Address: 0x100421fc)
- ExitProcess (Address: 0x10042034)
- FileTimeToSystemTime (Address: 0x100420a0)
- FindClose (Address: 0x1004218c)
- FindFirstFileExW (Address: 0x10042190)
- FindNextFileW (Address: 0x10042194)
- FindResourceExW (Address: 0x10042110)
- FindResourceW (Address: 0x10042120)
- FlushFileBuffers (Address: 0x10042224)
- FlushInstructionCache (Address: 0x10042150)
- FormatMessageW (Address: 0x10042124)
- FreeEnvironmentStringsW (Address: 0x10042220)
- FreeLibrary (Address: 0x10042080)
- GetACP (Address: 0x10042210)
- GetCommandLineA (Address: 0x10042218)
- GetCommandLineW (Address: 0x1004212c)
- GetConsoleCP (Address: 0x1004222c)
- GetConsoleMode (Address: 0x10042208)
- GetCPInfo (Address: 0x100421a4)
- GetCurrentProcess (Address: 0x1004202c)
- GetCurrentProcessId (Address: 0x10042030)
- GetCurrentThread (Address: 0x1004203c)
- GetCurrentThreadId (Address: 0x100420b4)
- GetEnvironmentStringsW (Address: 0x1004221c)
- GetEnvironmentVariableW (Address: 0x10042160)
- GetExitCodeProcess (Address: 0x10042168)
- GetFileSizeEx (Address: 0x1004220c)
- GetFileType (Address: 0x10042204)
- GetLastError (Address: 0x10042008)
- GetLocaleInfoW (Address: 0x100421f0)
- GetModuleFileNameW (Address: 0x10042084)
- GetModuleHandleExW (Address: 0x100421e8)
- GetModuleHandleW (Address: 0x10042088)
- GetOEMCP (Address: 0x10042214)
- GetProcAddress (Address: 0x1004208c)
- GetProcessHeap (Address: 0x10042018)
- GetStartupInfoW (Address: 0x10042048)
- GetStdHandle (Address: 0x10042200)
- GetStringTypeW (Address: 0x1004217c)
- GetSystemDirectoryW (Address: 0x10042130)
- GetSystemInfo (Address: 0x100420c4)
- GetSystemTime (Address: 0x1004204c)
- GetSystemTimeAsFileTime (Address: 0x100421b0)
- GetSystemWow64DirectoryW (Address: 0x10042134)
- GetThreadContext (Address: 0x10042148)
- GetThreadLocale (Address: 0x10042128)
- GetTickCount (Address: 0x10042050)
- GetUserDefaultLCID (Address: 0x100421f8)
- GetWindowsDirectoryW (Address: 0x10042054)
- GlobalAlloc (Address: 0x100420d4)
- GlobalFree (Address: 0x100420e0)
- GlobalLock (Address: 0x100420dc)
- GlobalUnlock (Address: 0x100420d8)
- HeapAlloc (Address: 0x10042010)
- HeapDestroy (Address: 0x100420f0)
- HeapFree (Address: 0x10042014)
- HeapReAlloc (Address: 0x100420f4)
- HeapSize (Address: 0x100420f8)
- InitializeCriticalSectionAndSpinCount (Address: 0x100420fc)
- InitializeCriticalSectionEx (Address: 0x10042188)
- InitializeSListHead (Address: 0x100421c8)
- InterlockedFlushSList (Address: 0x100421d4)
- IsDebuggerPresent (Address: 0x100420d0)
- IsProcessorFeaturePresent (Address: 0x100421c4)
- IsValidCodePage (Address: 0x100420e8)
- IsValidLocale (Address: 0x100421f4)
- IsWow64Process (Address: 0x1004207c)
- LCMapStringEx (Address: 0x100421a8)
- LCMapStringW (Address: 0x100421ec)
- LeaveCriticalSection (Address: 0x10042184)
- LoadLibraryExA (Address: 0x10042170)
- LoadLibraryExW (Address: 0x10042174)
- LoadLibraryW (Address: 0x10042090)
- LoadResource (Address: 0x10042114)
- LocalAlloc (Address: 0x10042094)
- LocalFree (Address: 0x10042098)
- LockResource (Address: 0x10042118)
- lstrlenA (Address: 0x100420e4)
- lstrlenW (Address: 0x1004209c)
- MapViewOfFile (Address: 0x10042068)
- MultiByteToWideChar (Address: 0x100420a8)
- OpenFileMappingW (Address: 0x10042064)
- OpenProcess (Address: 0x100420b8)
- OutputDebugStringA (Address: 0x10042164)
- OutputDebugStringW (Address: 0x100421cc)
- Process32FirstW (Address: 0x1004213c)
- Process32NextW (Address: 0x10042140)
- ProcessIdToSessionId (Address: 0x10042138)
- QueryPerformanceCounter (Address: 0x100421ac)
- RaiseException (Address: 0x100420c0)
- ReadProcessMemory (Address: 0x1004216c)
- ResetEvent (Address: 0x100421b4)
- ResumeThread (Address: 0x10042040)
- RtlUnwind (Address: 0x100421d0)
- SetEvent (Address: 0x1004201c)
- SetFilePointerEx (Address: 0x10042198)
- SetLastError (Address: 0x1004200c)
- SetStdHandle (Address: 0x10042178)
- SetThreadContext (Address: 0x1004214c)
- SetUnhandledExceptionFilter (Address: 0x100421c0)
- SizeofResource (Address: 0x1004211c)
- Sleep (Address: 0x10042028)
- SuspendThread (Address: 0x10042144)
- SystemTimeToFileTime (Address: 0x100420a4)
- TerminateProcess (Address: 0x10042038)
- TlsAlloc (Address: 0x100421d8)
- TlsFree (Address: 0x100421e4)
- TlsGetValue (Address: 0x100421dc)
- TlsSetValue (Address: 0x100421e0)
- UnhandledExceptionFilter (Address: 0x100421bc)
- UnmapViewOfFile (Address: 0x1004206c)
- VerifyVersionInfoW (Address: 0x100420c8)
- VerSetConditionMask (Address: 0x100420bc)
- VirtualAlloc (Address: 0x10042104)
- VirtualAllocEx (Address: 0x10042058)
- VirtualFree (Address: 0x10042108)
- VirtualProtect (Address: 0x10042154)
- VirtualProtectEx (Address: 0x10042158)
- VirtualQuery (Address: 0x1004210c)
- VirtualQueryEx (Address: 0x1004215c)
- WaitForSingleObject (Address: 0x10042020)
- WaitForSingleObjectEx (Address: 0x100421b8)
- WideCharToMultiByte (Address: 0x100420ac)
- WriteConsoleW (Address: 0x10042230)
- WriteFile (Address: 0x10042228)
- WriteProcessMemory (Address: 0x1004205c)