rld.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: 227ce581ed91d4345a963f9e9d820021
File Size: 335.5 KB
Uploaded At: Feb. 9, 2026, 10:25 a.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx
Exported Functions
- (Ordinal: 1, Address: 0xa3a0)
- (Ordinal: 2, Address: 0x8700)
Imported DLLs & Functions
ADVAPI32.dll
- OpenProcessToken (Address: 0x1000d000)
KERNEL32.dll
- CloseHandle (Address: 0x1000d024)
- CompareFileTime (Address: 0x1000d0b0)
- CreateDirectoryA (Address: 0x1000d09c)
- CreateEventA (Address: 0x1000d04c)
- CreateFileA (Address: 0x1000d104)
- CreateFileW (Address: 0x1000d0d4)
- CreateThread (Address: 0x1000d0f4)
- ExitProcess (Address: 0x1000d058)
- ExitThread (Address: 0x1000d0d8)
- FlushFileBuffers (Address: 0x1000d0dc)
- FreeLibrary (Address: 0x1000d08c)
- GetCurrentProcess (Address: 0x1000d034)
- GetCurrentProcessId (Address: 0x1000d048)
- GetCurrentThreadId (Address: 0x1000d0ec)
- GetFileAttributesA (Address: 0x1000d0cc)
- GetFileAttributesW (Address: 0x1000d0d0)
- GetFileSize (Address: 0x1000d0a8)
- GetFileTime (Address: 0x1000d0e8)
- GetLastError (Address: 0x1000d07c)
- GetModuleFileNameA (Address: 0x1000d0a0)
- GetModuleHandleA (Address: 0x1000d040)
- GetProcAddress (Address: 0x1000d050)
- GetProcessTimes (Address: 0x1000d0c0)
- GetTempPathA (Address: 0x1000d0a4)
- GetThreadContext (Address: 0x1000d068)
- GetTickCount (Address: 0x1000d0b8)
- GetVersionExA (Address: 0x1000d084)
- HeapAlloc (Address: 0x1000d090)
- HeapCreate (Address: 0x1000d100)
- HeapFree (Address: 0x1000d0f8)
- LoadLibraryA (Address: 0x1000d054)
- lstrcatA (Address: 0x1000d098)
- lstrcmpA (Address: 0x1000d06c)
- lstrcmpiA (Address: 0x1000d05c)
- lstrcmpiW (Address: 0x1000d060)
- lstrcpyA (Address: 0x1000d028)
- lstrcpynA (Address: 0x1000d030)
- lstrcpynW (Address: 0x1000d074)
- lstrcpyW (Address: 0x1000d064)
- lstrlenA (Address: 0x1000d008)
- lstrlenW (Address: 0x1000d018)
- MultiByteToWideChar (Address: 0x1000d014)
- OpenEventA (Address: 0x1000d0e0)
- QueryPerformanceCounter (Address: 0x1000d038)
- QueryPerformanceFrequency (Address: 0x1000d044)
- ReadFile (Address: 0x1000d0fc)
- ReadProcessMemory (Address: 0x1000d0c8)
- ResumeThread (Address: 0x1000d088)
- SetEndOfFile (Address: 0x1000d0ac)
- SetEnvironmentVariableA (Address: 0x1000d03c)
- SetEvent (Address: 0x1000d0b4)
- SetFilePointer (Address: 0x1000d094)
- SetLastError (Address: 0x1000d01c)
- SetThreadContext (Address: 0x1000d070)
- TerminateProcess (Address: 0x1000d078)
- VirtualAlloc (Address: 0x1000d020)
- VirtualAllocEx (Address: 0x1000d080)
- VirtualFree (Address: 0x1000d00c)
- VirtualFreeEx (Address: 0x1000d0c4)
- VirtualProtect (Address: 0x1000d02c)
- WaitForMultipleObjects (Address: 0x1000d0e4)
- WideCharToMultiByte (Address: 0x1000d010)
- WriteFile (Address: 0x1000d0bc)
- WriteProcessMemory (Address: 0x1000d0f0)
USER32.dll
- CharLowerA (Address: 0x1000d124)
- CreateWindowExA (Address: 0x1000d134)
- DefWindowProcA (Address: 0x1000d138)
- DispatchMessageA (Address: 0x1000d13c)
- GetMessageA (Address: 0x1000d118)
- GetWindowLongA (Address: 0x1000d130)
- KillTimer (Address: 0x1000d128)
- MessageBoxA (Address: 0x1000d140)
- PostQuitMessage (Address: 0x1000d10c)
- RegisterClassExA (Address: 0x1000d110)
- SendMessageA (Address: 0x1000d11c)
- SetTimer (Address: 0x1000d114)
- SetWindowLongA (Address: 0x1000d120)
- UnregisterClassA (Address: 0x1000d12c)
- wsprintfA (Address: 0x1000d144)
USERENV.dll
- GetUserProfileDirectoryA (Address: 0x1000d14c)