rld.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: c8207a78ef2bb104f78daa159fc5ac19
File Size: 442.5 KB
Uploaded At: Feb. 4, 2026, 6:04 a.m.
Views: 11
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx
Exported Functions
- (Ordinal: 1, Address: 0xd850)
- (Ordinal: 2, Address: 0xbc00)
Imported DLLs & Functions
ADVAPI32.dll
- OpenProcessToken (Address: 0x10011000)
KERNEL32.dll
- AddVectoredExceptionHandler (Address: 0x10011100)
- CloseHandle (Address: 0x10011024)
- CompareFileTime (Address: 0x100110ac)
- CreateDirectoryA (Address: 0x1001103c)
- CreateEventA (Address: 0x1001106c)
- CreateFileA (Address: 0x1001100c)
- CreateFileW (Address: 0x1001101c)
- CreateThread (Address: 0x100110f4)
- ExitProcess (Address: 0x10011070)
- ExitThread (Address: 0x100110d8)
- FlushFileBuffers (Address: 0x100110dc)
- FreeLibrary (Address: 0x10011094)
- GetCurrentProcess (Address: 0x10011054)
- GetCurrentProcessId (Address: 0x10011068)
- GetCurrentThreadId (Address: 0x100110ec)
- GetFileAttributesA (Address: 0x100110d0)
- GetFileAttributesW (Address: 0x100110d4)
- GetFileSize (Address: 0x100110a4)
- GetFileTime (Address: 0x100110e8)
- GetLastError (Address: 0x10011040)
- GetModuleFileNameA (Address: 0x10011104)
- GetModuleHandleA (Address: 0x10011060)
- GetProcAddress (Address: 0x10011108)
- GetProcessTimes (Address: 0x100110c4)
- GetTempPathA (Address: 0x1001104c)
- GetThreadContext (Address: 0x1001107c)
- GetTickCount (Address: 0x100110bc)
- HeapAlloc (Address: 0x10011098)
- HeapCreate (Address: 0x1001109c)
- HeapFree (Address: 0x100110fc)
- LoadLibraryA (Address: 0x100110a0)
- LockFile (Address: 0x100110b8)
- lstrcatA (Address: 0x10011034)
- lstrcmpA (Address: 0x10011080)
- lstrcmpiA (Address: 0x10011074)
- lstrcmpiW (Address: 0x10011078)
- lstrcpyA (Address: 0x10011028)
- lstrcpynA (Address: 0x10011050)
- lstrlenA (Address: 0x10011010)
- lstrlenW (Address: 0x10011020)
- MultiByteToWideChar (Address: 0x10011038)
- OpenEventA (Address: 0x100110e0)
- QueryPerformanceCounter (Address: 0x10011058)
- QueryPerformanceFrequency (Address: 0x10011064)
- ReadFile (Address: 0x10011018)
- ReadProcessMemory (Address: 0x100110cc)
- ResumeThread (Address: 0x10011090)
- SetEndOfFile (Address: 0x100110a8)
- SetEnvironmentVariableA (Address: 0x1001105c)
- SetEvent (Address: 0x100110b4)
- SetFilePointer (Address: 0x1001102c)
- SetLastError (Address: 0x10011044)
- SetStdHandle (Address: 0x100110f8)
- SetThreadContext (Address: 0x10011084)
- TerminateProcess (Address: 0x10011088)
- UnlockFile (Address: 0x100110b0)
- VirtualAlloc (Address: 0x10011048)
- VirtualAllocEx (Address: 0x1001108c)
- VirtualFree (Address: 0x10011030)
- VirtualFreeEx (Address: 0x100110c8)
- VirtualProtect (Address: 0x10011008)
- WaitForMultipleObjects (Address: 0x100110e4)
- WideCharToMultiByte (Address: 0x10011014)
- WriteFile (Address: 0x100110c0)
- WriteProcessMemory (Address: 0x100110f0)
USER32.dll
- CharLowerA (Address: 0x10011118)
- CreateWindowExA (Address: 0x1001113c)
- DefWindowProcA (Address: 0x10011140)
- DispatchMessageA (Address: 0x10011148)
- GetMessageA (Address: 0x10011110)
- GetWindowLongA (Address: 0x10011138)
- IsWindow (Address: 0x10011144)
- KillTimer (Address: 0x10011128)
- MessageBoxA (Address: 0x1001114c)
- PostQuitMessage (Address: 0x10011124)
- RegisterClassExA (Address: 0x10011120)
- SendMessageA (Address: 0x1001112c)
- SetTimer (Address: 0x10011114)
- SetWindowLongA (Address: 0x10011130)
- UnregisterClassA (Address: 0x10011134)
- wsprintfA (Address: 0x1001111c)
USERENV.dll
- GetUserProfileDirectoryA (Address: 0x10011154)