ldpkit.dll

Description: ldpkit

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.9.0.22603

Architecture: 32-bit

Operating System: Windows NT

SHA256: 2fa791b752459fb7fc323c33265dbb62

File Size: 293.5 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 14

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx

Exported Functions

  • (Ordinal: 1, Address: 0x9c50)
  • ServiceMain (Ordinal: 2, Address: 0x9630)
  • (Ordinal: 3, Address: 0x10e10)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x10031008)
  • CompareStringW (Address: 0x10031190)
  • CreateEventW (Address: 0x100310c0)
  • CreateFileMappingW (Address: 0x1003109c)
  • CreateFileW (Address: 0x1003113c)
  • CreateThread (Address: 0x10031080)
  • CreateToolhelp32Snapshot (Address: 0x10031110)
  • CreateWaitableTimerW (Address: 0x100310c8)
  • DecodePointer (Address: 0x10031004)
  • DeleteCriticalSection (Address: 0x10031028)
  • DuplicateHandle (Address: 0x10031088)
  • EncodePointer (Address: 0x100310a8)
  • EnterCriticalSection (Address: 0x100310ac)
  • ExitProcess (Address: 0x100310e0)
  • ExitThread (Address: 0x10031184)
  • ExpandEnvironmentStringsW (Address: 0x10031040)
  • FileTimeToSystemTime (Address: 0x1003107c)
  • FindClose (Address: 0x100311a4)
  • FindFirstFileExW (Address: 0x100311a8)
  • FindNextFileW (Address: 0x100311ac)
  • FindResourceExW (Address: 0x100310f4)
  • FindResourceW (Address: 0x10031104)
  • FlushFileBuffers (Address: 0x100311d4)
  • FreeEnvironmentStringsW (Address: 0x100311c4)
  • FreeLibrary (Address: 0x10031068)
  • FreeLibraryAndExitThread (Address: 0x10031188)
  • GetACP (Address: 0x100311b0)
  • GetCommandLineA (Address: 0x100311bc)
  • GetCommandLineW (Address: 0x100310d0)
  • GetConsoleCP (Address: 0x100311dc)
  • GetConsoleMode (Address: 0x100311e0)
  • GetCPInfo (Address: 0x100311b8)
  • GetCurrentProcess (Address: 0x10031094)
  • GetCurrentProcessId (Address: 0x10031138)
  • GetCurrentThread (Address: 0x10031098)
  • GetCurrentThreadId (Address: 0x100310cc)
  • GetEnvironmentStringsW (Address: 0x100311c0)
  • GetExitCodeThread (Address: 0x10031034)
  • GetFileType (Address: 0x100311a0)
  • GetLastError (Address: 0x10031010)
  • GetModuleFileNameW (Address: 0x1003106c)
  • GetModuleHandleExW (Address: 0x1003118c)
  • GetModuleHandleW (Address: 0x10031084)
  • GetOEMCP (Address: 0x100311b4)
  • GetProcAddress (Address: 0x10031070)
  • GetProcessHeap (Address: 0x10031020)
  • GetProcessTimes (Address: 0x10031044)
  • GetStartupInfoW (Address: 0x1003115c)
  • GetStdHandle (Address: 0x1003119c)
  • GetStringTypeW (Address: 0x100311cc)
  • GetSystemDirectoryW (Address: 0x10031058)
  • GetSystemInfo (Address: 0x1003112c)
  • GetSystemTime (Address: 0x10031050)
  • GetSystemTimeAsFileTime (Address: 0x10031054)
  • GetTimeZoneInformation (Address: 0x10031198)
  • GetWindowsDirectoryW (Address: 0x1003105c)
  • HeapAlloc (Address: 0x10031018)
  • HeapDestroy (Address: 0x100310d4)
  • HeapFree (Address: 0x1003101c)
  • HeapReAlloc (Address: 0x100310d8)
  • HeapSize (Address: 0x100310dc)
  • InitializeCriticalSectionAndSpinCount (Address: 0x10031024)
  • InitializeSListHead (Address: 0x10031164)
  • InterlockedFlushSList (Address: 0x1003116c)
  • IsDebuggerPresent (Address: 0x10031140)
  • IsProcessorFeaturePresent (Address: 0x10031150)
  • IsValidCodePage (Address: 0x10031144)
  • IsWow64Process (Address: 0x10031064)
  • LCMapStringW (Address: 0x10031194)
  • LeaveCriticalSection (Address: 0x100310b0)
  • LoadLibraryExA (Address: 0x1003114c)
  • LoadLibraryExW (Address: 0x10031180)
  • LoadLibraryW (Address: 0x10031074)
  • LoadResource (Address: 0x100310f8)
  • LocalFree (Address: 0x10031108)
  • LockResource (Address: 0x100310fc)
  • MapViewOfFile (Address: 0x100310a0)
  • Module32FirstW (Address: 0x1003111c)
  • Module32NextW (Address: 0x10031120)
  • MultiByteToWideChar (Address: 0x10031038)
  • OutputDebugStringW (Address: 0x10031000)
  • Process32FirstW (Address: 0x10031114)
  • Process32NextW (Address: 0x10031118)
  • QueryFullProcessImageNameW (Address: 0x10031078)
  • QueryPerformanceCounter (Address: 0x10031160)
  • QueueUserAPC (Address: 0x10031090)
  • RaiseException (Address: 0x1003100c)
  • ReadProcessMemory (Address: 0x100310e8)
  • ResetEvent (Address: 0x100310b8)
  • ResumeThread (Address: 0x1003104c)
  • RtlUnwind (Address: 0x10031168)
  • SetEnvironmentVariableW (Address: 0x1003103c)
  • SetEvent (Address: 0x100310b4)
  • SetFilePointerEx (Address: 0x100311c8)
  • SetLastError (Address: 0x10031014)
  • SetStdHandle (Address: 0x100311d0)
  • SetUnhandledExceptionFilter (Address: 0x10031158)
  • SetWaitableTimer (Address: 0x100310c4)
  • SizeofResource (Address: 0x10031100)
  • SleepEx (Address: 0x1003108c)
  • SystemTimeToFileTime (Address: 0x10031128)
  • TerminateProcess (Address: 0x10031048)
  • TerminateThread (Address: 0x10031030)
  • TlsAlloc (Address: 0x10031170)
  • TlsFree (Address: 0x1003117c)
  • TlsGetValue (Address: 0x10031174)
  • TlsSetValue (Address: 0x10031178)
  • UnhandledExceptionFilter (Address: 0x10031154)
  • UnmapViewOfFile (Address: 0x100310a4)
  • VirtualAlloc (Address: 0x10031130)
  • VirtualAllocEx (Address: 0x100310e4)
  • VirtualFree (Address: 0x10031134)
  • VirtualFreeEx (Address: 0x100310f0)
  • VirtualProtect (Address: 0x10031148)
  • VirtualQuery (Address: 0x10031060)
  • WaitForMultipleObjects (Address: 0x10031124)
  • WaitForSingleObject (Address: 0x1003102c)
  • WaitForSingleObjectEx (Address: 0x100310bc)
  • WideCharToMultiByte (Address: 0x1003110c)
  • WriteConsoleW (Address: 0x100311e4)
  • WriteFile (Address: 0x100311d8)
  • WriteProcessMemory (Address: 0x100310ec)