GearNtKe.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 8aa6307435fa29ec221a445c131c73ce

File Size: 76.0 KB

Uploaded At: March 18, 2026, 8:37 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: CreateRemoteThread, WriteProcessMemory, VirtualAllocEx

Exported Functions

  • ??0CGearNtKe@@QAE@XZ (Ordinal: 1, Address: 0x16a0)
  • ??4CGearNtKe@@QAEAAV0@ABV0@@Z (Ordinal: 2, Address: 0x1000)
  • AddProcess (Ordinal: 3, Address: 0x16b0)
  • GetSpeed (Ordinal: 4, Address: 0x16f0)
  • OldSetTimer (Ordinal: 5, Address: 0x11e0)
  • SetSpeed (Ordinal: 6, Address: 0x1700)
  • UnIntercept (Ordinal: 7, Address: 0x15b0)
  • fnGearNtKe (Ordinal: 8, Address: 0x1690)
  • nGearNtKe (Ordinal: 9, Address: 0x10388)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x1000c020)
  • CreateMutexA (Address: 0x1000c024)
  • CreateProcessA (Address: 0x1000c018)
  • CreateProcessW (Address: 0x1000c010)
  • CreateRemoteThread (Address: 0x1000c034)
  • DeleteCriticalSection (Address: 0x1000c0b0)
  • EnterCriticalSection (Address: 0x1000c0d8)
  • ExitProcess (Address: 0x1000c080)
  • FlushFileBuffers (Address: 0x1000c118)
  • FlushInstructionCache (Address: 0x1000c054)
  • FreeEnvironmentStringsA (Address: 0x1000c0b4)
  • FreeEnvironmentStringsW (Address: 0x1000c030)
  • GetACP (Address: 0x1000c0f4)
  • GetCommandLineA (Address: 0x1000c074)
  • GetCPInfo (Address: 0x1000c0f0)
  • GetCurrentProcess (Address: 0x1000c06c)
  • GetCurrentThreadId (Address: 0x1000c088)
  • GetEnvironmentStrings (Address: 0x1000c02c)
  • GetEnvironmentStringsW (Address: 0x1000c0c0)
  • GetFileType (Address: 0x1000c000)
  • GetLastError (Address: 0x1000c09c)
  • GetModuleFileNameA (Address: 0x1000c01c)
  • GetModuleFileNameW (Address: 0x1000c014)
  • GetModuleHandleA (Address: 0x1000c048)
  • GetModuleHandleW (Address: 0x1000c060)
  • GetOEMCP (Address: 0x1000c0f8)
  • GetProcAddress (Address: 0x1000c044)
  • GetStartupInfoA (Address: 0x1000c0ac)
  • GetStdHandle (Address: 0x1000c0a4)
  • GetStringTypeA (Address: 0x1000c104)
  • GetStringTypeW (Address: 0x1000c108)
  • GetThreadContext (Address: 0x1000c058)
  • GetTickCount (Address: 0x1000c004)
  • GetVersion (Address: 0x1000c078)
  • HeapAlloc (Address: 0x1000c0e0)
  • HeapCreate (Address: 0x1000c0c8)
  • HeapDestroy (Address: 0x1000c0c4)
  • HeapFree (Address: 0x1000c0d0)
  • HeapReAlloc (Address: 0x1000c0b8)
  • InitializeCriticalSection (Address: 0x1000c0ec)
  • InterlockedDecrement (Address: 0x1000c0e4)
  • InterlockedIncrement (Address: 0x1000c0e8)
  • LCMapStringA (Address: 0x1000c10c)
  • LCMapStringW (Address: 0x1000c110)
  • LeaveCriticalSection (Address: 0x1000c0dc)
  • LoadLibraryA (Address: 0x1000c070)
  • MultiByteToWideChar (Address: 0x1000c100)
  • QueryPerformanceCounter (Address: 0x1000c0a8)
  • RaiseException (Address: 0x1000c114)
  • ReleaseMutex (Address: 0x1000c008)
  • ResumeThread (Address: 0x1000c04c)
  • RtlUnwind (Address: 0x1000c07c)
  • SetFilePointer (Address: 0x1000c11c)
  • SetHandleCount (Address: 0x1000c0a0)
  • SetLastError (Address: 0x1000c064)
  • SetStdHandle (Address: 0x1000c0fc)
  • SetThreadContext (Address: 0x1000c050)
  • SuspendThread (Address: 0x1000c05c)
  • TerminateProcess (Address: 0x1000c084)
  • TlsAlloc (Address: 0x1000c090)
  • TlsFree (Address: 0x1000c094)
  • TlsGetValue (Address: 0x1000c098)
  • TlsSetValue (Address: 0x1000c08c)
  • VirtualAlloc (Address: 0x1000c0bc)
  • VirtualAllocEx (Address: 0x1000c040)
  • VirtualFree (Address: 0x1000c0cc)
  • VirtualProtect (Address: 0x1000c068)
  • VirtualProtectEx (Address: 0x1000c03c)
  • WaitForSingleObject (Address: 0x1000c00c)
  • WideCharToMultiByte (Address: 0x1000c028)
  • WriteFile (Address: 0x1000c0d4)
  • WriteProcessMemory (Address: 0x1000c038)
USER32.dll
  • GetMessageTime (Address: 0x1000c124)
  • SetTimer (Address: 0x1000c128)
WINMM.dll
  • timeGetTime (Address: 0x1000c134)
  • timeSetEvent (Address: 0x1000c130)