MXDWDRV.DLL

Description: Microsoft XPS Document Writer

Authors: © Microsoft Corporation. All rights reserved.

Version: 0.3.19041.6456

Architecture: 32-bit

Operating System: Windows NT

SHA256: 40cd76fb4cfe61a810fab7760087801a

File Size: 1008.0 KB

Uploaded At: Dec. 1, 2025, 7:48 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllMain (Ordinal: 1, Address: 0x12900)
  • DrvDisableDriver (Ordinal: 2, Address: 0x12f40)
  • DrvEnableDriver (Ordinal: 3, Address: 0x13090)
  • DrvQueryDriverInfo (Ordinal: 4, Address: 0x12d30)

Imported DLLs & Functions

ADVAPI32.dll
  • GetTraceEnableFlags (Address: 0x100f2008)
  • GetTraceEnableLevel (Address: 0x100f2004)
  • GetTraceLoggerHandle (Address: 0x100f200c)
  • RegCloseKey (Address: 0x100f2024)
  • RegisterTraceGuidsW (Address: 0x100f2018)
  • RegOpenKeyExW (Address: 0x100f201c)
  • RegQueryValueExW (Address: 0x100f2020)
  • TraceEvent (Address: 0x100f2014)
  • TraceMessage (Address: 0x100f2010)
  • UnregisterTraceGuids (Address: 0x100f2000)
DWrite.dll
  • DWriteCreateFactory (Address: 0x100f202c)
GDI32.dll
  • BRUSHOBJ_pvAllocRbrush (Address: 0x100f205c)
  • BRUSHOBJ_pvGetRbrush (Address: 0x100f2044)
  • CLIPOBJ_ppoGetPath (Address: 0x100f2054)
  • EngAlphaBlend (Address: 0x100f20b8)
  • EngAssociateSurface (Address: 0x100f209c)
  • EngBitBlt (Address: 0x100f20a8)
  • EngCopyBits (Address: 0x100f20a4)
  • EngCreateBitmap (Address: 0x100f20bc)
  • EngCreateDeviceSurface (Address: 0x100f20cc)
  • EngCreatePalette (Address: 0x100f20c0)
  • EngDeletePalette (Address: 0x100f20c4)
  • EngDeletePath (Address: 0x100f2048)
  • EngDeleteSurface (Address: 0x100f20c8)
  • EngEraseSurface (Address: 0x100f2050)
  • EngFillPath (Address: 0x100f207c)
  • EngGradientFill (Address: 0x100f2074)
  • EngLockSurface (Address: 0x100f2094)
  • EngMarkBandingSurface (Address: 0x100f2098)
  • EngPlgBlt (Address: 0x100f20b0)
  • EngStretchBlt (Address: 0x100f2090)
  • EngStretchBltROP (Address: 0x100f20ac)
  • EngStrokeAndFillPath (Address: 0x100f2078)
  • EngStrokePath (Address: 0x100f2080)
  • EngTextOut (Address: 0x100f2060)
  • EngTransparentBlt (Address: 0x100f20b4)
  • EngUnlockSurface (Address: 0x100f2084)
  • FONTOBJ_cGetGlyphs (Address: 0x100f2040)
  • FONTOBJ_pifi (Address: 0x100f2070)
  • FONTOBJ_pQueryGlyphAttrs (Address: 0x100f206c)
  • FONTOBJ_pvTrueTypeFontFile (Address: 0x100f204c)
  • FONTOBJ_pxoGetXform (Address: 0x100f20a0)
  • PATHOBJ_bEnum (Address: 0x100f2034)
  • PATHOBJ_vEnumStart (Address: 0x100f2038)
  • STROBJ_bEnum (Address: 0x100f2064)
  • STROBJ_vEnumStart (Address: 0x100f2068)
  • XFORMOBJ_bApplyXform (Address: 0x100f203c)
  • XFORMOBJ_iGetXform (Address: 0x100f2058)
  • XLATEOBJ_cGetPalette (Address: 0x100f2088)
  • XLATEOBJ_piVector (Address: 0x100f208c)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x100f2210)
  • AcquireSRWLockShared (Address: 0x100f2208)
  • CloseHandle (Address: 0x100f218c)
  • CloseThreadpoolTimer (Address: 0x100f21f0)
  • CompareStringW (Address: 0x100f20f0)
  • CreateEventW (Address: 0x100f211c)
  • CreateFileMappingW (Address: 0x100f21c4)
  • CreateFileW (Address: 0x100f2178)
  • CreateHardLinkW (Address: 0x100f21bc)
  • CreateMutexExW (Address: 0x100f21d0)
  • CreateSemaphoreExW (Address: 0x100f21cc)
  • CreateThreadpoolTimer (Address: 0x100f21dc)
  • DebugBreak (Address: 0x100f221c)
  • DecodePointer (Address: 0x100f216c)
  • DeleteCriticalSection (Address: 0x100f2180)
  • DeleteFileW (Address: 0x100f21d8)
  • DisableThreadLibraryCalls (Address: 0x100f2138)
  • EncodePointer (Address: 0x100f2168)
  • EnterCriticalSection (Address: 0x100f212c)
  • FindClose (Address: 0x100f2194)
  • FindFirstFileW (Address: 0x100f21a0)
  • FindNextFileW (Address: 0x100f219c)
  • FormatMessageA (Address: 0x100f213c)
  • FormatMessageW (Address: 0x100f2234)
  • FreeLibrary (Address: 0x100f214c)
  • GetCurrentProcess (Address: 0x100f20e8)
  • GetCurrentProcessId (Address: 0x100f2108)
  • GetCurrentThreadId (Address: 0x100f20d4)
  • GetFileSize (Address: 0x100f21b0)
  • GetLastError (Address: 0x100f2144)
  • GetModuleFileNameA (Address: 0x100f2220)
  • GetModuleFileNameW (Address: 0x100f2120)
  • GetModuleHandleExW (Address: 0x100f20fc)
  • GetModuleHandleW (Address: 0x100f2154)
  • GetProcAddress (Address: 0x100f2158)
  • GetProcessHeap (Address: 0x100f2228)
  • GetStringTypeW (Address: 0x100f2164)
  • GetSystemDirectoryW (Address: 0x100f2238)
  • GetSystemInfo (Address: 0x100f21c8)
  • GetSystemTimeAsFileTime (Address: 0x100f20d8)
  • GetTempFileNameW (Address: 0x100f21a8)
  • GetTempPathW (Address: 0x100f21a4)
  • GetTickCount (Address: 0x100f20dc)
  • GetVersionExW (Address: 0x100f215c)
  • GlobalLock (Address: 0x100f21e4)
  • GlobalUnlock (Address: 0x100f2118)
  • HeapAlloc (Address: 0x100f2230)
  • HeapFree (Address: 0x100f2224)
  • InitializeCriticalSection (Address: 0x100f2184)
  • InitializeCriticalSectionEx (Address: 0x100f21e8)
  • IsDebuggerPresent (Address: 0x100f2218)
  • LeaveCriticalSection (Address: 0x100f2188)
  • LoadLibraryExA (Address: 0x100f2110)
  • LoadLibraryExW (Address: 0x100f2150)
  • LoadLibraryW (Address: 0x100f2100)
  • LocalAlloc (Address: 0x100f217c)
  • LocalFree (Address: 0x100f2140)
  • MapViewOfFile (Address: 0x100f21c0)
  • MulDiv (Address: 0x100f2124)
  • MultiByteToWideChar (Address: 0x100f21d4)
  • OpenProcess (Address: 0x100f222c)
  • OpenSemaphoreW (Address: 0x100f21e0)
  • OutputDebugStringW (Address: 0x100f2214)
  • QueryFullProcessImageNameW (Address: 0x100f223c)
  • QueryPerformanceCounter (Address: 0x100f20f4)
  • RaiseException (Address: 0x100f210c)
  • ReadFile (Address: 0x100f21b4)
  • ReleaseMutex (Address: 0x100f21fc)
  • ReleaseSemaphore (Address: 0x100f2200)
  • ReleaseSRWLockExclusive (Address: 0x100f220c)
  • ReleaseSRWLockShared (Address: 0x100f2204)
  • RemoveDirectoryW (Address: 0x100f2198)
  • SetEvent (Address: 0x100f2128)
  • SetFilePointer (Address: 0x100f21b8)
  • SetLastError (Address: 0x100f2134)
  • SetThreadpoolTimer (Address: 0x100f21f8)
  • SetUnhandledExceptionFilter (Address: 0x100f20e4)
  • Sleep (Address: 0x100f20f8)
  • SleepConditionVariableSRW (Address: 0x100f2174)
  • TerminateProcess (Address: 0x100f20ec)
  • UnhandledExceptionFilter (Address: 0x100f20e0)
  • UnmapViewOfFile (Address: 0x100f2104)
  • VerifyVersionInfoW (Address: 0x100f2148)
  • VirtualProtect (Address: 0x100f2114)
  • VirtualQuery (Address: 0x100f2160)
  • WaitForSingleObject (Address: 0x100f2130)
  • WaitForSingleObjectEx (Address: 0x100f21ec)
  • WaitForThreadpoolTimerCallbacks (Address: 0x100f21f4)
  • WakeAllConditionVariable (Address: 0x100f2170)
  • WideCharToMultiByte (Address: 0x100f2190)
  • WriteFile (Address: 0x100f21ac)
msvcrt.dll
  • ___lc_codepage_func (Address: 0x100f22f4)
  • ___lc_handle_func (Address: 0x100f22f8)
  • ___mb_cur_max_func (Address: 0x100f22e0)
  • __crtLCMapStringA (Address: 0x100f236c)
  • __crtLCMapStringW (Address: 0x100f2368)
  • __CxxFrameHandler3 (Address: 0x100f2418)
  • __dllonexit (Address: 0x100f23a8)
  • __pctype_func (Address: 0x100f2300)
  • __RTDynamicCast (Address: 0x100f2384)
  • __uncaught_exception (Address: 0x100f22e8)
  • _amsg_exit (Address: 0x100f23bc)
  • _beginthreadex (Address: 0x100f23e0)
  • _callnewh (Address: 0x100f23d8)
  • _CIsqrt (Address: 0x100f2374)
  • _CxxThrowException (Address: 0x100f23d4)
  • _errno (Address: 0x100f22e4)
  • _except_handler4_common (Address: 0x100f2390)
  • _finite (Address: 0x100f2338)
  • _fseeki64 (Address: 0x100f2320)
  • _ftol2 (Address: 0x100f2388)
  • _ftol2_sse (Address: 0x100f238c)
  • _initterm (Address: 0x100f23b8)
  • _ismbblead (Address: 0x100f2414)
  • _lock (Address: 0x100f23b0)
  • _onexit (Address: 0x100f23a4)
  • _purecall (Address: 0x100f2410)
  • _stricmp (Address: 0x100f23dc)
  • _unlock (Address: 0x100f23ac)
  • _vsnprintf (Address: 0x100f240c)
  • _vsnprintf_s (Address: 0x100f235c)
  • _vsnwprintf (Address: 0x100f2364)
  • _wcsdup (Address: 0x100f2308)
  • _wcsicmp (Address: 0x100f23e8)
  • _wsetlocale (Address: 0x100f2370)
  • _XcptFilter (Address: 0x100f23c0)
  • ??0bad_cast@@QAE@ABV0@@Z (Address: 0x100f2350)
  • ??0bad_cast@@QAE@PBD@Z (Address: 0x100f2348)
  • ??0exception@@QAE@ABQBD@Z (Address: 0x100f23d0)
  • ??0exception@@QAE@ABQBDH@Z (Address: 0x100f23cc)
  • ??0exception@@QAE@ABV0@@Z (Address: 0x100f23fc)
  • ??0exception@@QAE@XZ (Address: 0x100f2400)
  • ??1bad_cast@@UAE@XZ (Address: 0x100f234c)
  • ??1exception@@UAE@XZ (Address: 0x100f2404)
  • ??1type_info@@UAE@XZ (Address: 0x100f2394)
  • ?terminate@@YAXXZ (Address: 0x100f23b4)
  • ?what@exception@@UBEPBDXZ (Address: 0x100f2408)
  • abort (Address: 0x100f22d8)
  • calloc (Address: 0x100f22f0)
  • ceil (Address: 0x100f241c)
  • fclose (Address: 0x100f2334)
  • fflush (Address: 0x100f232c)
  • fgetc (Address: 0x100f2314)
  • fgetpos (Address: 0x100f2324)
  • fputc (Address: 0x100f2330)
  • free (Address: 0x100f23f8)
  • fsetpos (Address: 0x100f231c)
  • fwrite (Address: 0x100f23f0)
  • isalnum (Address: 0x100f237c)
  • isdigit (Address: 0x100f2378)
  • islower (Address: 0x100f22ec)
  • isspace (Address: 0x100f23a0)
  • isupper (Address: 0x100f22fc)
  • ldexp (Address: 0x100f22d4)
  • localeconv (Address: 0x100f2340)
  • malloc (Address: 0x100f23ec)
  • memchr (Address: 0x100f2398)
  • memcmp (Address: 0x100f2380)
  • memcpy (Address: 0x100f23c8)
  • memcpy_s (Address: 0x100f2360)
  • memmove (Address: 0x100f23c4)
  • memmove_s (Address: 0x100f2358)
  • memset (Address: 0x100f22dc)
  • realloc (Address: 0x100f2354)
  • setlocale (Address: 0x100f2304)
  • setvbuf (Address: 0x100f2328)
  • sprintf_s (Address: 0x100f2344)
  • strcpy_s (Address: 0x100f2310)
  • strcspn (Address: 0x100f233c)
  • tolower (Address: 0x100f239c)
  • ungetc (Address: 0x100f2318)
  • wcscpy_s (Address: 0x100f23f4)
  • wcsrchr (Address: 0x100f23e4)
  • wcsstr (Address: 0x100f230c)
ntdll.dll
  • VerSetConditionMask (Address: 0x100f2424)
ole32.dll
  • CoCreateGuid (Address: 0x100f2438)
  • CoCreateInstance (Address: 0x100f243c)
  • CoInitializeEx (Address: 0x100f2444)
  • CoTaskMemFree (Address: 0x100f2430)
  • CoUninitialize (Address: 0x100f2440)
  • CreateStreamOnHGlobal (Address: 0x100f2434)
  • GetHGlobalFromStream (Address: 0x100f2448)
  • StringFromGUID2 (Address: 0x100f242c)
OLEAUT32.dll
  • GetErrorInfo (Address: 0x100f2248)
  • SetErrorInfo (Address: 0x100f2250)
  • SysAllocString (Address: 0x100f2254)
  • SysAllocStringLen (Address: 0x100f2260)
  • SysFreeString (Address: 0x100f2244)
  • SysStringLen (Address: 0x100f224c)
  • VariantClear (Address: 0x100f225c)
  • VariantInit (Address: 0x100f2258)
USER32.dll
  • CopyRect (Address: 0x100f2268)
  • EqualRect (Address: 0x100f2274)
  • InflateRect (Address: 0x100f2270)
  • IntersectRect (Address: 0x100f226c)
  • IsRectEmpty (Address: 0x100f2280)
  • OffsetRect (Address: 0x100f227c)
  • SetRectEmpty (Address: 0x100f2284)
  • UnionRect (Address: 0x100f2278)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x100f2294)
  • GetFileVersionInfoW (Address: 0x100f228c)
  • VerQueryValueW (Address: 0x100f2290)
WINSPOOL.DRV
  • AbortPrinter (Address: 0x100f22ac)
  • DocumentPropertiesW (Address: 0x100f22b0)
  • EndPagePrinter (Address: 0x100f22b4)
  • EnumFormsW (Address: 0x100f22c4)
  • GetJobW (Address: 0x100f229c)
  • GetPrinterDataW (Address: 0x100f22a8)
  • GetPrinterDriverW (Address: 0x100f22a0)
  • GetPrinterW (Address: 0x100f22bc)
  • SetJobW (Address: 0x100f22b8)
  • StartPagePrinter (Address: 0x100f22c0)
  • WritePrinter (Address: 0x100f22a4)
XmlLite.dll
  • CreateXmlReader (Address: 0x100f22cc)