rld.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 227ce581ed91d4345a963f9e9d820021

File Size: 335.5 KB

Uploaded At: Feb. 9, 2026, 10:25 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx

Exported Functions

  • (Ordinal: 1, Address: 0xa3a0)
  • (Ordinal: 2, Address: 0x8700)

Imported DLLs & Functions

ADVAPI32.dll
  • OpenProcessToken (Address: 0x1000d000)
KERNEL32.dll
  • CloseHandle (Address: 0x1000d024)
  • CompareFileTime (Address: 0x1000d0b0)
  • CreateDirectoryA (Address: 0x1000d09c)
  • CreateEventA (Address: 0x1000d04c)
  • CreateFileA (Address: 0x1000d104)
  • CreateFileW (Address: 0x1000d0d4)
  • CreateThread (Address: 0x1000d0f4)
  • ExitProcess (Address: 0x1000d058)
  • ExitThread (Address: 0x1000d0d8)
  • FlushFileBuffers (Address: 0x1000d0dc)
  • FreeLibrary (Address: 0x1000d08c)
  • GetCurrentProcess (Address: 0x1000d034)
  • GetCurrentProcessId (Address: 0x1000d048)
  • GetCurrentThreadId (Address: 0x1000d0ec)
  • GetFileAttributesA (Address: 0x1000d0cc)
  • GetFileAttributesW (Address: 0x1000d0d0)
  • GetFileSize (Address: 0x1000d0a8)
  • GetFileTime (Address: 0x1000d0e8)
  • GetLastError (Address: 0x1000d07c)
  • GetModuleFileNameA (Address: 0x1000d0a0)
  • GetModuleHandleA (Address: 0x1000d040)
  • GetProcAddress (Address: 0x1000d050)
  • GetProcessTimes (Address: 0x1000d0c0)
  • GetTempPathA (Address: 0x1000d0a4)
  • GetThreadContext (Address: 0x1000d068)
  • GetTickCount (Address: 0x1000d0b8)
  • GetVersionExA (Address: 0x1000d084)
  • HeapAlloc (Address: 0x1000d090)
  • HeapCreate (Address: 0x1000d100)
  • HeapFree (Address: 0x1000d0f8)
  • LoadLibraryA (Address: 0x1000d054)
  • lstrcatA (Address: 0x1000d098)
  • lstrcmpA (Address: 0x1000d06c)
  • lstrcmpiA (Address: 0x1000d05c)
  • lstrcmpiW (Address: 0x1000d060)
  • lstrcpyA (Address: 0x1000d028)
  • lstrcpynA (Address: 0x1000d030)
  • lstrcpynW (Address: 0x1000d074)
  • lstrcpyW (Address: 0x1000d064)
  • lstrlenA (Address: 0x1000d008)
  • lstrlenW (Address: 0x1000d018)
  • MultiByteToWideChar (Address: 0x1000d014)
  • OpenEventA (Address: 0x1000d0e0)
  • QueryPerformanceCounter (Address: 0x1000d038)
  • QueryPerformanceFrequency (Address: 0x1000d044)
  • ReadFile (Address: 0x1000d0fc)
  • ReadProcessMemory (Address: 0x1000d0c8)
  • ResumeThread (Address: 0x1000d088)
  • SetEndOfFile (Address: 0x1000d0ac)
  • SetEnvironmentVariableA (Address: 0x1000d03c)
  • SetEvent (Address: 0x1000d0b4)
  • SetFilePointer (Address: 0x1000d094)
  • SetLastError (Address: 0x1000d01c)
  • SetThreadContext (Address: 0x1000d070)
  • TerminateProcess (Address: 0x1000d078)
  • VirtualAlloc (Address: 0x1000d020)
  • VirtualAllocEx (Address: 0x1000d080)
  • VirtualFree (Address: 0x1000d00c)
  • VirtualFreeEx (Address: 0x1000d0c4)
  • VirtualProtect (Address: 0x1000d02c)
  • WaitForMultipleObjects (Address: 0x1000d0e4)
  • WideCharToMultiByte (Address: 0x1000d010)
  • WriteFile (Address: 0x1000d0bc)
  • WriteProcessMemory (Address: 0x1000d0f0)
USER32.dll
  • CharLowerA (Address: 0x1000d124)
  • CreateWindowExA (Address: 0x1000d134)
  • DefWindowProcA (Address: 0x1000d138)
  • DispatchMessageA (Address: 0x1000d13c)
  • GetMessageA (Address: 0x1000d118)
  • GetWindowLongA (Address: 0x1000d130)
  • KillTimer (Address: 0x1000d128)
  • MessageBoxA (Address: 0x1000d140)
  • PostQuitMessage (Address: 0x1000d10c)
  • RegisterClassExA (Address: 0x1000d110)
  • SendMessageA (Address: 0x1000d11c)
  • SetTimer (Address: 0x1000d114)
  • SetWindowLongA (Address: 0x1000d120)
  • UnregisterClassA (Address: 0x1000d12c)
  • wsprintfA (Address: 0x1000d144)
USERENV.dll
  • GetUserProfileDirectoryA (Address: 0x1000d14c)