What is Rundll32.exe?

Source: Internet
Author: User

What's Rundll32.exe?

What happened to the Rundll32.exe error? How to fix the Rundll32.exe of the virus infection? The RUNDLL32 process is a process that we often see, and this process is often exploited by viruses, "executing 32-bit DLL files." Its function is to execute the internal functions in the DLL file, so that in the process, there will be only Rundll32.exe, and no DLL back-door process, so that the process of the implementation of the hidden.

If you see multiple Rundll32.exe in the system, don't panic, which proves how many DLL files have been started with Rundll32.exe. Of course, these Rundll32.exe execute DLL files, and we can all find them from where the system is automatically loaded. Below we will come together to understand the Rundll32.exe process and learn to Rundll32.exe the wrong solution.

  function prototypes used by Rundll32.exe:

Void CALLBACK functionname (HWND hwnd,hinstance hinst,lptstr lpcmdline,int ncmdshow);

The following methods are used under the command line: Rundll32.exe dllname,functionname [Arguments]

Dllname is the name of the DLL to be executed; FunctionName is the specific derivation function of the DLL file that needs to be executed in the front; [Arguments] is the specific parameter of the derivation function.

  use Rundll32 to restart the machine experiment: Click "Start-Program-ms-dos mode", enter the DOS window, and then type Rundll32.exe user.exe,restartwindows, and then press ENTER, then you will see, The machine has been restarted!

Rundll. Exe

  Here are three points to note:

1.DLL file name can not contain spaces, such as the file is located in the C:programfiles directory, you have to change this path to c:progra~1;

2.DLL file name and DLL entry point between the comma can not be less, otherwise the program will be wrong and will not give any information!

3. This is the most important point: Rundll cannot be used to call DLLs with return value parameters, such as GetUserName (), Gettextface (), and so on in Win32API. In Visual Basic, a directive shell that executes an external program is provided, in the form of: Shell command column

If you can cooperate with Rundll32.exe use shell instructions, will make your VB program with other methods can not even achieve the effect: still to restart as an example, the traditional method requires you in the VB project to create a module, and then write the WINAPI declaration, finally in the program to call. And now just one sentence:

Shell "Rundll32.exe user.exe,restartwindows" is done!

In fact, Rundll32.exe has a unique advantage in calling various Windows Control panels and system options.

There are Rundll32.exe tools on the network to kill the infected Rundll32.exe process.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.