f:\svn\Cheat Engine\bin\d3dhook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d3dhook.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3dhook.dll
Resource
win10v2004-20240221-en
General
-
Target
d3dhook.dll
-
Size
94KB
-
MD5
09374a46033f2a0af149391ab32849d0
-
SHA1
c4fab6e45884a4d5dfec93b3d0b400ea2db7823a
-
SHA256
5d5876a8e10231d37833d2ec3a473a14c9a5584b44bcc9a13906c2a37fa69c21
-
SHA512
aea9569c39b90685bca9af91537f7b38f671a1438d22ca41ec8f8f8f4fed8b5360fcd07a5b41bc1e3f1aa281e7dcbe029b50a2211891717e3531e7b1ec639766
-
SSDEEP
1536:GyfNvGKKZVGcuasOKQBBTff07PSZHCSVKOCDCA32XQa:7NvG7vGcIiBTMS18RD732
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3dhook.dll
Files
-
d3dhook.dll.dll windows:5 windows x86 arch:x86
a4cee279203b8eef2b26aa769c0003a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateThread
OutputDebugStringA
GetModuleHandleW
LoadLibraryA
GetProcAddress
SetEvent
WaitForSingleObject
GetLastError
GetCurrentProcessId
OpenFileMappingA
MapViewOfFile
OpenEventA
CloseHandle
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
RaiseException
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetModuleHandleA
user32
SetWindowLongW
GetWindowLongW
CallWindowProcW
PtInRect
ClipCursor
ClientToScreen
GetClientRect
DefWindowProcA
ToAscii
GetKeyboardState
DestroyWindow
CreateWindowExW
AdjustWindowRect
RegisterClassExW
LoadCursorW
DefWindowProcW
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ