ldpkit.dll
Description: ldpkit
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.9.0.22603
Architecture: 32-bit
Operating System: Windows NT
SHA256: 2fa791b752459fb7fc323c33265dbb62
File Size: 293.5 KB
Uploaded At: Dec. 4, 2025, 6:17 a.m.
Views: 14
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx
Exported Functions
- (Ordinal: 1, Address: 0x9c50)
- ServiceMain (Ordinal: 2, Address: 0x9630)
- (Ordinal: 3, Address: 0x10e10)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x10031008)
- CompareStringW (Address: 0x10031190)
- CreateEventW (Address: 0x100310c0)
- CreateFileMappingW (Address: 0x1003109c)
- CreateFileW (Address: 0x1003113c)
- CreateThread (Address: 0x10031080)
- CreateToolhelp32Snapshot (Address: 0x10031110)
- CreateWaitableTimerW (Address: 0x100310c8)
- DecodePointer (Address: 0x10031004)
- DeleteCriticalSection (Address: 0x10031028)
- DuplicateHandle (Address: 0x10031088)
- EncodePointer (Address: 0x100310a8)
- EnterCriticalSection (Address: 0x100310ac)
- ExitProcess (Address: 0x100310e0)
- ExitThread (Address: 0x10031184)
- ExpandEnvironmentStringsW (Address: 0x10031040)
- FileTimeToSystemTime (Address: 0x1003107c)
- FindClose (Address: 0x100311a4)
- FindFirstFileExW (Address: 0x100311a8)
- FindNextFileW (Address: 0x100311ac)
- FindResourceExW (Address: 0x100310f4)
- FindResourceW (Address: 0x10031104)
- FlushFileBuffers (Address: 0x100311d4)
- FreeEnvironmentStringsW (Address: 0x100311c4)
- FreeLibrary (Address: 0x10031068)
- FreeLibraryAndExitThread (Address: 0x10031188)
- GetACP (Address: 0x100311b0)
- GetCommandLineA (Address: 0x100311bc)
- GetCommandLineW (Address: 0x100310d0)
- GetConsoleCP (Address: 0x100311dc)
- GetConsoleMode (Address: 0x100311e0)
- GetCPInfo (Address: 0x100311b8)
- GetCurrentProcess (Address: 0x10031094)
- GetCurrentProcessId (Address: 0x10031138)
- GetCurrentThread (Address: 0x10031098)
- GetCurrentThreadId (Address: 0x100310cc)
- GetEnvironmentStringsW (Address: 0x100311c0)
- GetExitCodeThread (Address: 0x10031034)
- GetFileType (Address: 0x100311a0)
- GetLastError (Address: 0x10031010)
- GetModuleFileNameW (Address: 0x1003106c)
- GetModuleHandleExW (Address: 0x1003118c)
- GetModuleHandleW (Address: 0x10031084)
- GetOEMCP (Address: 0x100311b4)
- GetProcAddress (Address: 0x10031070)
- GetProcessHeap (Address: 0x10031020)
- GetProcessTimes (Address: 0x10031044)
- GetStartupInfoW (Address: 0x1003115c)
- GetStdHandle (Address: 0x1003119c)
- GetStringTypeW (Address: 0x100311cc)
- GetSystemDirectoryW (Address: 0x10031058)
- GetSystemInfo (Address: 0x1003112c)
- GetSystemTime (Address: 0x10031050)
- GetSystemTimeAsFileTime (Address: 0x10031054)
- GetTimeZoneInformation (Address: 0x10031198)
- GetWindowsDirectoryW (Address: 0x1003105c)
- HeapAlloc (Address: 0x10031018)
- HeapDestroy (Address: 0x100310d4)
- HeapFree (Address: 0x1003101c)
- HeapReAlloc (Address: 0x100310d8)
- HeapSize (Address: 0x100310dc)
- InitializeCriticalSectionAndSpinCount (Address: 0x10031024)
- InitializeSListHead (Address: 0x10031164)
- InterlockedFlushSList (Address: 0x1003116c)
- IsDebuggerPresent (Address: 0x10031140)
- IsProcessorFeaturePresent (Address: 0x10031150)
- IsValidCodePage (Address: 0x10031144)
- IsWow64Process (Address: 0x10031064)
- LCMapStringW (Address: 0x10031194)
- LeaveCriticalSection (Address: 0x100310b0)
- LoadLibraryExA (Address: 0x1003114c)
- LoadLibraryExW (Address: 0x10031180)
- LoadLibraryW (Address: 0x10031074)
- LoadResource (Address: 0x100310f8)
- LocalFree (Address: 0x10031108)
- LockResource (Address: 0x100310fc)
- MapViewOfFile (Address: 0x100310a0)
- Module32FirstW (Address: 0x1003111c)
- Module32NextW (Address: 0x10031120)
- MultiByteToWideChar (Address: 0x10031038)
- OutputDebugStringW (Address: 0x10031000)
- Process32FirstW (Address: 0x10031114)
- Process32NextW (Address: 0x10031118)
- QueryFullProcessImageNameW (Address: 0x10031078)
- QueryPerformanceCounter (Address: 0x10031160)
- QueueUserAPC (Address: 0x10031090)
- RaiseException (Address: 0x1003100c)
- ReadProcessMemory (Address: 0x100310e8)
- ResetEvent (Address: 0x100310b8)
- ResumeThread (Address: 0x1003104c)
- RtlUnwind (Address: 0x10031168)
- SetEnvironmentVariableW (Address: 0x1003103c)
- SetEvent (Address: 0x100310b4)
- SetFilePointerEx (Address: 0x100311c8)
- SetLastError (Address: 0x10031014)
- SetStdHandle (Address: 0x100311d0)
- SetUnhandledExceptionFilter (Address: 0x10031158)
- SetWaitableTimer (Address: 0x100310c4)
- SizeofResource (Address: 0x10031100)
- SleepEx (Address: 0x1003108c)
- SystemTimeToFileTime (Address: 0x10031128)
- TerminateProcess (Address: 0x10031048)
- TerminateThread (Address: 0x10031030)
- TlsAlloc (Address: 0x10031170)
- TlsFree (Address: 0x1003117c)
- TlsGetValue (Address: 0x10031174)
- TlsSetValue (Address: 0x10031178)
- UnhandledExceptionFilter (Address: 0x10031154)
- UnmapViewOfFile (Address: 0x100310a4)
- VirtualAlloc (Address: 0x10031130)
- VirtualAllocEx (Address: 0x100310e4)
- VirtualFree (Address: 0x10031134)
- VirtualFreeEx (Address: 0x100310f0)
- VirtualProtect (Address: 0x10031148)
- VirtualQuery (Address: 0x10031060)
- WaitForMultipleObjects (Address: 0x10031124)
- WaitForSingleObject (Address: 0x1003102c)
- WaitForSingleObjectEx (Address: 0x100310bc)
- WideCharToMultiByte (Address: 0x1003110c)
- WriteConsoleW (Address: 0x100311e4)
- WriteFile (Address: 0x100311d8)
- WriteProcessMemory (Address: 0x100310ec)