{"id":58370,"date":"2017-11-30T01:08:48","date_gmt":"2017-11-30T07:08:48","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=58370"},"modified":"2017-11-30T01:08:48","modified_gmt":"2017-11-30T07:08:48","slug":"running-dll-files-malware-analysis","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/","title":{"rendered":"Running DLL Files for Malware Analysis"},"content":{"rendered":"<p><em><strong>READ FIRST<\/strong>: Disclaimer &#8211; Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other harm to property and even life in the case of a system which is in control of some equipment or machinery. When analyzing malware, you must always do so on a machine which has no personal identifying information, you do not personally value, and which is de-networked (not connected) to any other device of value to you or anyone else. If you choose to use the techniques described in this article, you are agreeing that you understand this notice and that you use the information at your own risk. PC Pitstop, Inc. is not responsible for any damage to property or life as a result of following the advice of or otherwise using the information on this page. The proper way to analyze malware is on a de-networked device with no private information, which is not in the position of controlling any equipment, and\/or an isolated virtual-machine environment subscribing to those same terms. If you do not understand or do not agree to the above terms, please exit this post and do not follow any information in it to analyze malware.<\/em><\/p>\n<h1>Intro<\/h1>\n<p>If you&#8217;ve been a Windows user for a while,chances are, you&#8217;ve seen dll files and errors associated with them. Chances are, you also are aware that you cannot &#8220;double-click&#8221; dll files to run them, or just run them at the commandline. DLL files are technically still executable files because they house executable binary code and in fact, they are of the same format as a .exe file is. The main code differences are there is a bit set in DllCharacteristics of the file&#8217;s PE header and there are also exported functions rather than a typical main\/WinMain function which starts when a .exe file is run.<\/p>\n<p>Knowing how to analyze DLL malware is important for two reasons:<\/p>\n<ol>\n<li>Without knowing how to load up the DLL, we cannot perform any dynamic analysis<\/li>\n<li>There is some very bad and prevalent DLL malware out in the wild<\/li>\n<li>DLLs can be loaded into legitimate processes, causing normal programs to conduct malicious behavior<\/li>\n<li>Malware can sometimes step around security software by making calls to DLL loaders like rundll32.exe, which is an allowed Microsoft file<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h1>The Loader<\/h1>\n<p>The main technical difference that differentiates DLLs from EXE files is the loading process. In a regular EXE, when a user double-clicks the file, the Windows PE Image Loader parses the PE headers, performs some integrity checks, and sets up all of the memory <b>sections<\/b> for the file. These memory sections include the .text or .code section, the .data section, .rdata section, and more. In fact, other, non-standard sections can be added if a programmer desires. These sections, when mapped (loaded) into active RAM, may not be mapped in the same position they were in sitting in the PE file on disk. The important thing to note is that DLL files have most of these same traits (multiple sections, PE header, etc..) except that the Windows PE Loader will not load them directly for a user.<\/p>\n<p>The purpose of DLL files is to be a collection of functionality (a &#8220;library&#8221;) that <em>other programs<\/em> can utilize. Thus, programs can directly load DLLs in a variety of ways; one way being using the API calls <strong>LoadLibrary<\/strong> or <strong>LoadLibraryEx<\/strong>, followed by <strong>GetProcAddress<\/strong> to locate the address of a specific function in the DLL. This is essentially what rundll32.exe does when it is passed a dll file and function as arguments. This is also why we often see LoadLibrary and GetProcAddress used in malware which implements its own custom loader to load up DLLs which were not specified in the PE Header.<\/p>\n<p>The morale of the story is that another program is needed to load a DLL file. We will cover 3 separate ways using 3 separate programs which can be used to load DLLs in this post, as well as instructions on how to load them.<\/p>\n<h2>#1 &#8211; Rundll32.exe for basic dynamic analysis<\/h2>\n<p>This is the simplest method to load a DLL file but also doesn&#8217;t conitribute to analysis directly. Open up a Command Prompt window. On newer versions of Windows, you can simply hit the Windows key on the keyboard and then type &#8220;cmd&#8221; and press enter to do this. Now, navigate to the file on disk using the cd command and once you are in the directory with the dll you want to analyze, you type:<\/p>\n<blockquote><p>rundll32.exe DllToAnalyze.dll<\/p><\/blockquote>\n<p>which wil automatically load DllMain, which is much like a standard main function in a regular exe. To access a function other than DllMain, you have a couple of options. The first option is specifying the function by its function name like this:<\/p>\n<blockquote><p>rundll32.exe DllToAnalyze.dll,FunctionToRun several parameters here separated by spaces<\/p><\/blockquote>\n<p>The second option is to call the function by ordinal, which is just a identification number associated with the function:<\/p>\n<blockquote><p>rundll32.exe DllToAnalyze.dll,#5<\/p><\/blockquote>\n<p>This would call the function which has the ordinal #5. View the below screenshot to understand how an ordinal is associated with a function:<\/p>\n<figure id=\"attachment_58384\" aria-describedby=\"caption-attachment-58384\" style=\"width: 347px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Ordinals.png\"><img decoding=\"async\" class=\"size-full wp-image-58384\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Ordinals.png\" alt=\"Ordinals being shown in Professional PE Explorer\" width=\"347\" height=\"77\" \/><\/a><figcaption id=\"caption-attachment-58384\" class=\"wp-caption-text\">Here the PE parsing tool <a href=\"https:\/\/www.mzrst.com\/\" target=\"_blank\" rel=\"noopener\">Professional PE Explorer<\/a> aka Puppy is used to display the DLL exports. Notice how each has a name, ordinal, and relative virtual address (RVA).<\/figcaption><\/figure>\n<p>These ordinals are arbitrary and do not necessary follow a standard format between different DLLs. Unfortunately with rundll, passing in arguments to functions can get tricky so there are some limitations on which exported functions we can call this way. One limitation is that the calling convention of the function must be _stdcall. There are a few other limitations listed on the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/164787\/info-windows-rundll-and-rundll32-interface\" target=\"_blank\" rel=\"noopener\">Microsoft Support page<\/a>. The biggest caution here is that when rundll32 fails, it may not notify the user so the user may think the function is simply not working when in reality, rundll32 was supplied improper arguments.<\/p>\n<p>The purpose of doing this to analyze files requires an analyst to first have dynamic monitoring tools running and ready to go. So before executing a rundll32 call to a dll, start up the necessary monitoring tools like ProcMon, Process Explorer, Process Hacker, Wireshark, etc&#8230; Once the DLL is executed, remember to <strong>watch the behaviors of rundll32.exe instead of the dll file directly<\/strong> and then turn monitoring off and analyze using the tools shortly thereafter.<\/p>\n<h2>#2 &#8211; OllyDbg\/x64Dbg Loader<\/h2>\n<p>Debuggers such as OllyDbg and x64Dbg come with DLL loaders which are capable of loading a given DLL at an entry-point of the analyst&#8217;s choosing. See this screenshot for an example of using the OllyDbg loader to load a DLL:<\/p>\n<figure id=\"attachment_58374\" aria-describedby=\"caption-attachment-58374\" style=\"width: 433px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/OllyDbg_Dll_Loader.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-58374\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/OllyDbg_Dll_Loader.png\" alt=\"OllyDbg Dll call export dialog\" width=\"433\" height=\"318\" \/><\/a><figcaption id=\"caption-attachment-58374\" class=\"wp-caption-text\">In this DLL malware, we see that there are 3 function exports that we can choose to load up.<\/figcaption><\/figure>\n<p>Most of the time, these types of loaders must be accessed from a menu, which can add to the confusion of beginning analysts since the file will not simply break at the start like a .exe file does. To access the loader options in OllyDbg, open up a DLL file and choose yes to have it loaded, then go to Debug -&gt; Call DLL Export at the top of your OllyDbg window. <strong>This is only available if you&#8217;ve opened a DLL file inside OllyDbg.<\/strong><\/p>\n<p><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/OllyDbg_Loader_2.png\"><img decoding=\"async\" class=\"aligncenter  wp-image-58379\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/OllyDbg_Loader_2.png\" alt=\"\" width=\"459\" height=\"335\" \/><\/a><\/p>\n<p>As you can see, OllyDbg allows you to jump to the function&#8217;s assembly code as well as even pass arguments to the function as seen in item 2. Finally, the Call button at the bottom right (#3) invokes the function so that EIP is now pointing at the start of it and the analyst can debug as if the file were a normal exe from this point.<\/p>\n<h2>#3 &#8211; IDA Pro<\/h2>\n<p>The Interactive Disassembler aka IDA Pro also has the ability to load DLL files. Not only is IDA Pro a disassembler, but it is also a debugger. To load a DLL, go to Debugger -&gt; Process Options and set up your settings like so:<\/p>\n<figure id=\"attachment_58381\" aria-describedby=\"caption-attachment-58381\" style=\"width: 478px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/IDA_Pro_rundll32.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-58381\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/IDA_Pro_rundll32.png\" alt=\"IDA Pro Debugger options for rundll32\" width=\"478\" height=\"260\" \/><\/a><figcaption id=\"caption-attachment-58381\" class=\"wp-caption-text\">Notice the path of rundll32.exe as the main program to load with arguments of the dll file and ordinal number. Make sure you replace these paths with whereever your system32rundll32.exe is and your dll file.<\/figcaption><\/figure>\n<p>As you can see, we are actually using rundll32.exe like we did earlier, but we&#8217;re using it in a slightly different way because IDA Pro will take control of it. IDA Pro does not have it&#8217;s own DLL Loader like OllyDbg does. This may seem strange at first because what we are actually doing is debugging rundll32.exe rather than our malware DLL. However, rundll32.exe executes the malicious code this way so what we now need to do is get from Rundll32&#8217;s entrypoint to the point at which our malicious DLL is loaded in and executed. This would be a tedious process if it weren&#8217;t for a sweet option in IDA Pro. Go to Debugger &#8211; &gt; Debugger Options and then tick the following check box before clicking OK:<\/p>\n<figure id=\"attachment_58376\" aria-describedby=\"caption-attachment-58376\" style=\"width: 436px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/IDA_Suspend_Load.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-58376\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/IDA_Suspend_Load.png\" alt=\"Suspend on DLL Load IDA Pro\" width=\"436\" height=\"492\" \/><\/a><figcaption id=\"caption-attachment-58376\" class=\"wp-caption-text\">Suspend process on initial DLL Load<\/figcaption><\/figure>\n<p>Once this is ticked, go to the file&#8217;s entry point (the Rundll&#8217;s start which you will see in the disassembly window) and place a breakpoint on it (F2). Now go ahead and press F9. The execution should now be stopped at rundll&#8217;s entry point. From this point on, we&#8217;re going to pay close attention to the window highlighted below. Note we have shown a full screenshot so that you know which area of the screen that the window is usually found during active debugging. Click the image to enlarge:<\/p>\n<p><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Modules_Window.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-58377\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Modules_Window.png\" alt=\"IDA Pro Modules Debugging window\" width=\"748\" height=\"380\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Modules_Window.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Modules_Window-768x390.png 768w\" sizes=\"(max-width: 748px) 100vw, 748px\" \/><\/a><br \/>\nThe setting that we just set in the previous step allows us to now press F9 repeatedly and see each new &#8220;module&#8221; as it is loaded into Rundll32.exe. Note that a &#8220;module&#8221; is another name for a DLL file. So, the idea now is that we continue to press F9 until we see the DLL we want to analyze appear in that window and <strong>we do not press F9 past that point!<\/strong> IF you accidently press F9 too many times, you will have to start over to get back into the DLL&#8217;s code. Once the module has been loaded, double click it in the module&#8217;s window shown above to be taken to its entry point, press F2 to place a breakpoint on an instruction there and congratulations, you can now analyze the malicious code inside of the DLL which is being executed by rundll32!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ FIRST: Disclaimer &#8211; Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other harm to property and even life in the case of a system which is in control of some equipment or machinery. When analyzing malware, you must always do so on a machine [&hellip;]<\/p>\n","protected":false},"author":68,"featured_media":58386,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851,5090],"tags":[4719,5416,4895,5415],"class_list":["post-58370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","category-slider","tag-dll-files","tag-dynamic-analysis","tag-malware-research","tag-rundll32"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Running DLL Files for Malware Analysis<\/title>\n<meta name=\"description\" content=\"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Running DLL Files for Malware Analysis\" \/>\n<meta property=\"og:description\" content=\"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-30T07:08:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1923\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Matic Malware Research\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Malware Research\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/\"},\"author\":{\"name\":\"PC Matic Malware Research\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\"},\"headline\":\"Running DLL Files for Malware Analysis\",\"datePublished\":\"2017-11-30T07:08:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/\"},\"wordCount\":1785,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/DLLs_Banner.png\",\"keywords\":[\"DLL files\",\"dynamic analysis\",\"Malware Research\",\"rundll32\"],\"articleSection\":[\"Malware Research Team\",\"TechTalk Slider\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/\",\"name\":\"Running DLL Files for Malware Analysis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/DLLs_Banner.png\",\"datePublished\":\"2017-11-30T07:08:48+00:00\",\"description\":\"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/DLLs_Banner.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/DLLs_Banner.png\",\"width\":1923,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/running-dll-files-malware-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Running DLL Files for Malware Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\",\"name\":\"PC Matic Malware Research\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pc-matic-malware-research\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Running DLL Files for Malware Analysis","description":"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Running DLL Files for Malware Analysis","og_description":"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other","og_url":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-11-30T07:08:48+00:00","og_image":[{"width":1923,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png","type":"image\/png"}],"author":"PC Matic Malware Research","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Malware Research","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/"},"author":{"name":"PC Matic Malware Research","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c"},"headline":"Running DLL Files for Malware Analysis","datePublished":"2017-11-30T07:08:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/"},"wordCount":1785,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png","keywords":["DLL files","dynamic analysis","Malware Research","rundll32"],"articleSection":["Malware Research Team","TechTalk Slider"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/","url":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/","name":"Running DLL Files for Malware Analysis","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png","datePublished":"2017-11-30T07:08:48+00:00","description":"READ FIRST: Disclaimer - Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/DLLs_Banner.png","width":1923,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/running-dll-files-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Running DLL Files for Malware Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c","name":"PC Matic Malware Research","url":"https:\/\/www.pcmatic.com\/blog\/author\/pc-matic-malware-research\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=58370"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/58370\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/58386"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=58370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=58370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=58370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}