ldpkit64.dll
Description: ldpkit
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.9.0.22603
Architecture: 64-bit
Operating System: Windows NT
SHA256: 7991fd069a0e0d7c6270affa28329fc6
File Size: 337.5 KB
Uploaded At: Dec. 4, 2025, 6:17 a.m.
Views: 12
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx
Exported Functions
- (Ordinal: 1, Address: 0x7030)
- ServiceMain (Ordinal: 2, Address: 0x9eb0)
- (Ordinal: 3, Address: 0x11750)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x180035010)
- CompareStringW (Address: 0x180035358)
- CreateEventW (Address: 0x180035180)
- CreateFileMappingW (Address: 0x180035138)
- CreateFileW (Address: 0x180035288)
- CreateProcessW (Address: 0x1800351d0)
- CreateThread (Address: 0x180035100)
- CreateToolhelp32Snapshot (Address: 0x180035230)
- CreateWaitableTimerW (Address: 0x180035190)
- DecodePointer (Address: 0x180035008)
- DeleteCriticalSection (Address: 0x180035050)
- DuplicateHandle (Address: 0x180035110)
- EncodePointer (Address: 0x180035150)
- EnterCriticalSection (Address: 0x180035158)
- ExitProcess (Address: 0x1800351c0)
- ExitThread (Address: 0x180035340)
- ExpandEnvironmentStringsW (Address: 0x180035080)
- FileTimeToSystemTime (Address: 0x1800350f8)
- FindClose (Address: 0x180035380)
- FindFirstFileExW (Address: 0x180035388)
- FindNextFileW (Address: 0x180035390)
- FindResourceExW (Address: 0x1800351f8)
- FindResourceW (Address: 0x180035218)
- FlushFileBuffers (Address: 0x1800353e0)
- FreeEnvironmentStringsW (Address: 0x1800353c0)
- FreeLibrary (Address: 0x1800350d0)
- FreeLibraryAndExitThread (Address: 0x180035348)
- GetACP (Address: 0x180035398)
- GetCommandLineA (Address: 0x1800353b0)
- GetCommandLineW (Address: 0x1800351a0)
- GetConsoleCP (Address: 0x1800353f0)
- GetConsoleMode (Address: 0x1800353f8)
- GetCPInfo (Address: 0x1800353a8)
- GetCurrentProcess (Address: 0x180035128)
- GetCurrentProcessId (Address: 0x180035280)
- GetCurrentThread (Address: 0x180035130)
- GetCurrentThreadId (Address: 0x180035198)
- GetEnvironmentStringsW (Address: 0x1800353b8)
- GetExitCodeProcess (Address: 0x1800351c8)
- GetExitCodeThread (Address: 0x180035068)
- GetFileType (Address: 0x180035378)
- GetLastError (Address: 0x180035020)
- GetModuleFileNameW (Address: 0x1800350d8)
- GetModuleHandleExW (Address: 0x180035350)
- GetModuleHandleW (Address: 0x180035108)
- GetOEMCP (Address: 0x1800353a0)
- GetProcAddress (Address: 0x1800350e0)
- GetProcessHeap (Address: 0x180035040)
- GetProcessTimes (Address: 0x180035088)
- GetStartupInfoW (Address: 0x1800352d8)
- GetStdHandle (Address: 0x180035370)
- GetStringTypeW (Address: 0x1800353d0)
- GetSystemDirectoryW (Address: 0x1800350b0)
- GetSystemInfo (Address: 0x180035268)
- GetSystemTime (Address: 0x1800350a0)
- GetSystemTimeAsFileTime (Address: 0x1800350a8)
- GetTimeZoneInformation (Address: 0x180035368)
- GetWindowsDirectoryW (Address: 0x1800350b8)
- HeapAlloc (Address: 0x180035030)
- HeapDestroy (Address: 0x1800351a8)
- HeapFree (Address: 0x180035038)
- HeapReAlloc (Address: 0x1800351b0)
- HeapSize (Address: 0x1800351b8)
- InitializeCriticalSectionAndSpinCount (Address: 0x180035048)
- InitializeSListHead (Address: 0x1800352f0)
- InterlockedFlushSList (Address: 0x180035310)
- IsDebuggerPresent (Address: 0x180035290)
- IsProcessorFeaturePresent (Address: 0x1800352e0)
- IsValidCodePage (Address: 0x180035298)
- IsWow64Process (Address: 0x1800350c8)
- LCMapStringW (Address: 0x180035360)
- LeaveCriticalSection (Address: 0x180035160)
- LoadLibraryExA (Address: 0x1800352a8)
- LoadLibraryExW (Address: 0x180035338)
- LoadLibraryW (Address: 0x1800350e8)
- LoadResource (Address: 0x180035200)
- LocalFree (Address: 0x180035220)
- LockResource (Address: 0x180035208)
- MapViewOfFile (Address: 0x180035140)
- Module32FirstW (Address: 0x180035248)
- Module32NextW (Address: 0x180035250)
- MultiByteToWideChar (Address: 0x180035070)
- OutputDebugStringW (Address: 0x180035000)
- Process32FirstW (Address: 0x180035238)
- Process32NextW (Address: 0x180035240)
- QueryFullProcessImageNameW (Address: 0x1800350f0)
- QueryPerformanceCounter (Address: 0x1800352e8)
- QueueUserAPC (Address: 0x180035120)
- RaiseException (Address: 0x180035018)
- ReadProcessMemory (Address: 0x1800351e0)
- ResetEvent (Address: 0x180035170)
- ResumeThread (Address: 0x180035098)
- RtlCaptureContext (Address: 0x1800352b0)
- RtlLookupFunctionEntry (Address: 0x1800352b8)
- RtlPcToFileHeader (Address: 0x1800352f8)
- RtlUnwind (Address: 0x180035308)
- RtlUnwindEx (Address: 0x180035300)
- RtlVirtualUnwind (Address: 0x1800352c0)
- SetEnvironmentVariableW (Address: 0x180035078)
- SetEvent (Address: 0x180035168)
- SetFilePointerEx (Address: 0x1800353c8)
- SetLastError (Address: 0x180035028)
- SetStdHandle (Address: 0x1800353d8)
- SetUnhandledExceptionFilter (Address: 0x1800352d0)
- SetWaitableTimer (Address: 0x180035188)
- SizeofResource (Address: 0x180035210)
- SleepEx (Address: 0x180035118)
- SystemTimeToFileTime (Address: 0x180035260)
- TerminateProcess (Address: 0x180035090)
- TerminateThread (Address: 0x180035060)
- TlsAlloc (Address: 0x180035318)
- TlsFree (Address: 0x180035330)
- TlsGetValue (Address: 0x180035320)
- TlsSetValue (Address: 0x180035328)
- UnhandledExceptionFilter (Address: 0x1800352c8)
- UnmapViewOfFile (Address: 0x180035148)
- VirtualAlloc (Address: 0x180035270)
- VirtualAllocEx (Address: 0x1800351d8)
- VirtualFree (Address: 0x180035278)
- VirtualFreeEx (Address: 0x1800351f0)
- VirtualProtect (Address: 0x1800352a0)
- VirtualQuery (Address: 0x1800350c0)
- WaitForMultipleObjects (Address: 0x180035258)
- WaitForSingleObject (Address: 0x180035058)
- WaitForSingleObjectEx (Address: 0x180035178)
- WideCharToMultiByte (Address: 0x180035228)
- WriteConsoleW (Address: 0x180035400)
- WriteFile (Address: 0x1800353e8)
- WriteProcessMemory (Address: 0x1800351e8)