rld.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: c8207a78ef2bb104f78daa159fc5ac19

File Size: 442.5 KB

Uploaded At: Feb. 4, 2026, 6:04 a.m.

Views: 11

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx

Exported Functions

  • (Ordinal: 1, Address: 0xd850)
  • (Ordinal: 2, Address: 0xbc00)

Imported DLLs & Functions

ADVAPI32.dll
  • OpenProcessToken (Address: 0x10011000)
KERNEL32.dll
  • AddVectoredExceptionHandler (Address: 0x10011100)
  • CloseHandle (Address: 0x10011024)
  • CompareFileTime (Address: 0x100110ac)
  • CreateDirectoryA (Address: 0x1001103c)
  • CreateEventA (Address: 0x1001106c)
  • CreateFileA (Address: 0x1001100c)
  • CreateFileW (Address: 0x1001101c)
  • CreateThread (Address: 0x100110f4)
  • ExitProcess (Address: 0x10011070)
  • ExitThread (Address: 0x100110d8)
  • FlushFileBuffers (Address: 0x100110dc)
  • FreeLibrary (Address: 0x10011094)
  • GetCurrentProcess (Address: 0x10011054)
  • GetCurrentProcessId (Address: 0x10011068)
  • GetCurrentThreadId (Address: 0x100110ec)
  • GetFileAttributesA (Address: 0x100110d0)
  • GetFileAttributesW (Address: 0x100110d4)
  • GetFileSize (Address: 0x100110a4)
  • GetFileTime (Address: 0x100110e8)
  • GetLastError (Address: 0x10011040)
  • GetModuleFileNameA (Address: 0x10011104)
  • GetModuleHandleA (Address: 0x10011060)
  • GetProcAddress (Address: 0x10011108)
  • GetProcessTimes (Address: 0x100110c4)
  • GetTempPathA (Address: 0x1001104c)
  • GetThreadContext (Address: 0x1001107c)
  • GetTickCount (Address: 0x100110bc)
  • HeapAlloc (Address: 0x10011098)
  • HeapCreate (Address: 0x1001109c)
  • HeapFree (Address: 0x100110fc)
  • LoadLibraryA (Address: 0x100110a0)
  • LockFile (Address: 0x100110b8)
  • lstrcatA (Address: 0x10011034)
  • lstrcmpA (Address: 0x10011080)
  • lstrcmpiA (Address: 0x10011074)
  • lstrcmpiW (Address: 0x10011078)
  • lstrcpyA (Address: 0x10011028)
  • lstrcpynA (Address: 0x10011050)
  • lstrlenA (Address: 0x10011010)
  • lstrlenW (Address: 0x10011020)
  • MultiByteToWideChar (Address: 0x10011038)
  • OpenEventA (Address: 0x100110e0)
  • QueryPerformanceCounter (Address: 0x10011058)
  • QueryPerformanceFrequency (Address: 0x10011064)
  • ReadFile (Address: 0x10011018)
  • ReadProcessMemory (Address: 0x100110cc)
  • ResumeThread (Address: 0x10011090)
  • SetEndOfFile (Address: 0x100110a8)
  • SetEnvironmentVariableA (Address: 0x1001105c)
  • SetEvent (Address: 0x100110b4)
  • SetFilePointer (Address: 0x1001102c)
  • SetLastError (Address: 0x10011044)
  • SetStdHandle (Address: 0x100110f8)
  • SetThreadContext (Address: 0x10011084)
  • TerminateProcess (Address: 0x10011088)
  • UnlockFile (Address: 0x100110b0)
  • VirtualAlloc (Address: 0x10011048)
  • VirtualAllocEx (Address: 0x1001108c)
  • VirtualFree (Address: 0x10011030)
  • VirtualFreeEx (Address: 0x100110c8)
  • VirtualProtect (Address: 0x10011008)
  • WaitForMultipleObjects (Address: 0x100110e4)
  • WideCharToMultiByte (Address: 0x10011014)
  • WriteFile (Address: 0x100110c0)
  • WriteProcessMemory (Address: 0x100110f0)
USER32.dll
  • CharLowerA (Address: 0x10011118)
  • CreateWindowExA (Address: 0x1001113c)
  • DefWindowProcA (Address: 0x10011140)
  • DispatchMessageA (Address: 0x10011148)
  • GetMessageA (Address: 0x10011110)
  • GetWindowLongA (Address: 0x10011138)
  • IsWindow (Address: 0x10011144)
  • KillTimer (Address: 0x10011128)
  • MessageBoxA (Address: 0x1001114c)
  • PostQuitMessage (Address: 0x10011124)
  • RegisterClassExA (Address: 0x10011120)
  • SendMessageA (Address: 0x1001112c)
  • SetTimer (Address: 0x10011114)
  • SetWindowLongA (Address: 0x10011130)
  • UnregisterClassA (Address: 0x10011134)
  • wsprintfA (Address: 0x1001111c)
USERENV.dll
  • GetUserProfileDirectoryA (Address: 0x10011154)