ldpkit64.dll

Description: ldpkit

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.9.0.22603

Architecture: 64-bit

Operating System: Windows NT

SHA256: 7991fd069a0e0d7c6270affa28329fc6

File Size: 337.5 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx

Exported Functions

  • (Ordinal: 1, Address: 0x7030)
  • ServiceMain (Ordinal: 2, Address: 0x9eb0)
  • (Ordinal: 3, Address: 0x11750)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x180035010)
  • CompareStringW (Address: 0x180035358)
  • CreateEventW (Address: 0x180035180)
  • CreateFileMappingW (Address: 0x180035138)
  • CreateFileW (Address: 0x180035288)
  • CreateProcessW (Address: 0x1800351d0)
  • CreateThread (Address: 0x180035100)
  • CreateToolhelp32Snapshot (Address: 0x180035230)
  • CreateWaitableTimerW (Address: 0x180035190)
  • DecodePointer (Address: 0x180035008)
  • DeleteCriticalSection (Address: 0x180035050)
  • DuplicateHandle (Address: 0x180035110)
  • EncodePointer (Address: 0x180035150)
  • EnterCriticalSection (Address: 0x180035158)
  • ExitProcess (Address: 0x1800351c0)
  • ExitThread (Address: 0x180035340)
  • ExpandEnvironmentStringsW (Address: 0x180035080)
  • FileTimeToSystemTime (Address: 0x1800350f8)
  • FindClose (Address: 0x180035380)
  • FindFirstFileExW (Address: 0x180035388)
  • FindNextFileW (Address: 0x180035390)
  • FindResourceExW (Address: 0x1800351f8)
  • FindResourceW (Address: 0x180035218)
  • FlushFileBuffers (Address: 0x1800353e0)
  • FreeEnvironmentStringsW (Address: 0x1800353c0)
  • FreeLibrary (Address: 0x1800350d0)
  • FreeLibraryAndExitThread (Address: 0x180035348)
  • GetACP (Address: 0x180035398)
  • GetCommandLineA (Address: 0x1800353b0)
  • GetCommandLineW (Address: 0x1800351a0)
  • GetConsoleCP (Address: 0x1800353f0)
  • GetConsoleMode (Address: 0x1800353f8)
  • GetCPInfo (Address: 0x1800353a8)
  • GetCurrentProcess (Address: 0x180035128)
  • GetCurrentProcessId (Address: 0x180035280)
  • GetCurrentThread (Address: 0x180035130)
  • GetCurrentThreadId (Address: 0x180035198)
  • GetEnvironmentStringsW (Address: 0x1800353b8)
  • GetExitCodeProcess (Address: 0x1800351c8)
  • GetExitCodeThread (Address: 0x180035068)
  • GetFileType (Address: 0x180035378)
  • GetLastError (Address: 0x180035020)
  • GetModuleFileNameW (Address: 0x1800350d8)
  • GetModuleHandleExW (Address: 0x180035350)
  • GetModuleHandleW (Address: 0x180035108)
  • GetOEMCP (Address: 0x1800353a0)
  • GetProcAddress (Address: 0x1800350e0)
  • GetProcessHeap (Address: 0x180035040)
  • GetProcessTimes (Address: 0x180035088)
  • GetStartupInfoW (Address: 0x1800352d8)
  • GetStdHandle (Address: 0x180035370)
  • GetStringTypeW (Address: 0x1800353d0)
  • GetSystemDirectoryW (Address: 0x1800350b0)
  • GetSystemInfo (Address: 0x180035268)
  • GetSystemTime (Address: 0x1800350a0)
  • GetSystemTimeAsFileTime (Address: 0x1800350a8)
  • GetTimeZoneInformation (Address: 0x180035368)
  • GetWindowsDirectoryW (Address: 0x1800350b8)
  • HeapAlloc (Address: 0x180035030)
  • HeapDestroy (Address: 0x1800351a8)
  • HeapFree (Address: 0x180035038)
  • HeapReAlloc (Address: 0x1800351b0)
  • HeapSize (Address: 0x1800351b8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180035048)
  • InitializeSListHead (Address: 0x1800352f0)
  • InterlockedFlushSList (Address: 0x180035310)
  • IsDebuggerPresent (Address: 0x180035290)
  • IsProcessorFeaturePresent (Address: 0x1800352e0)
  • IsValidCodePage (Address: 0x180035298)
  • IsWow64Process (Address: 0x1800350c8)
  • LCMapStringW (Address: 0x180035360)
  • LeaveCriticalSection (Address: 0x180035160)
  • LoadLibraryExA (Address: 0x1800352a8)
  • LoadLibraryExW (Address: 0x180035338)
  • LoadLibraryW (Address: 0x1800350e8)
  • LoadResource (Address: 0x180035200)
  • LocalFree (Address: 0x180035220)
  • LockResource (Address: 0x180035208)
  • MapViewOfFile (Address: 0x180035140)
  • Module32FirstW (Address: 0x180035248)
  • Module32NextW (Address: 0x180035250)
  • MultiByteToWideChar (Address: 0x180035070)
  • OutputDebugStringW (Address: 0x180035000)
  • Process32FirstW (Address: 0x180035238)
  • Process32NextW (Address: 0x180035240)
  • QueryFullProcessImageNameW (Address: 0x1800350f0)
  • QueryPerformanceCounter (Address: 0x1800352e8)
  • QueueUserAPC (Address: 0x180035120)
  • RaiseException (Address: 0x180035018)
  • ReadProcessMemory (Address: 0x1800351e0)
  • ResetEvent (Address: 0x180035170)
  • ResumeThread (Address: 0x180035098)
  • RtlCaptureContext (Address: 0x1800352b0)
  • RtlLookupFunctionEntry (Address: 0x1800352b8)
  • RtlPcToFileHeader (Address: 0x1800352f8)
  • RtlUnwind (Address: 0x180035308)
  • RtlUnwindEx (Address: 0x180035300)
  • RtlVirtualUnwind (Address: 0x1800352c0)
  • SetEnvironmentVariableW (Address: 0x180035078)
  • SetEvent (Address: 0x180035168)
  • SetFilePointerEx (Address: 0x1800353c8)
  • SetLastError (Address: 0x180035028)
  • SetStdHandle (Address: 0x1800353d8)
  • SetUnhandledExceptionFilter (Address: 0x1800352d0)
  • SetWaitableTimer (Address: 0x180035188)
  • SizeofResource (Address: 0x180035210)
  • SleepEx (Address: 0x180035118)
  • SystemTimeToFileTime (Address: 0x180035260)
  • TerminateProcess (Address: 0x180035090)
  • TerminateThread (Address: 0x180035060)
  • TlsAlloc (Address: 0x180035318)
  • TlsFree (Address: 0x180035330)
  • TlsGetValue (Address: 0x180035320)
  • TlsSetValue (Address: 0x180035328)
  • UnhandledExceptionFilter (Address: 0x1800352c8)
  • UnmapViewOfFile (Address: 0x180035148)
  • VirtualAlloc (Address: 0x180035270)
  • VirtualAllocEx (Address: 0x1800351d8)
  • VirtualFree (Address: 0x180035278)
  • VirtualFreeEx (Address: 0x1800351f0)
  • VirtualProtect (Address: 0x1800352a0)
  • VirtualQuery (Address: 0x1800350c0)
  • WaitForMultipleObjects (Address: 0x180035258)
  • WaitForSingleObject (Address: 0x180035058)
  • WaitForSingleObjectEx (Address: 0x180035178)
  • WideCharToMultiByte (Address: 0x180035228)
  • WriteConsoleW (Address: 0x180035400)
  • WriteFile (Address: 0x1800353e8)
  • WriteProcessMemory (Address: 0x1800351e8)