文件名 | steam_api64.dll |
文件类型 |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
扫描器版本 | 1.0.152.174 |
数据库版本 | 2023-12-23 16:02:35 UTC |
恶意软件家族: GameHack
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
0f6340b710d8e0c425dec36b5547f2d2
|
|
SHA1 |
2b7c5c7a008c3d0976eea519b255d2d1eaf3d691
|
|
SHA256 |
43618964fbf8c21dbf7b22ba88b65d6fc1008c2f152c2b141e5f1ebd01ab6de1
|
|
SHA512 |
984d551341c1e87f2340c0d271eb998f82e7abed1b1c43dcebbfa625400da7034225e448eccaf5b7dc5e4148d03a7ec96662bf0d4de641a6dcd9884fb645cdbb
|
|
ImpHash |
b5c6c6ff3849e69932423f7a91d6ac27
|
映像基址 | 0x180000000 |
入口点 | 0x18003fd10 |
编译时间 | 2016-03-09 15:57:13 |
校验和 | 0x00000000 (实际: 0x00180ec6) |
操作系统版本 | 6.0 |
PEiD 签名 |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
7 库
KERNEL32, USER32, GDI32, ADVAPI32, SHELL32, ole32, WINMM |
导出 | 738 函数 |
资源 | 4 资源 |
节 | 8 节 |
CompanyName | *!ReLOADeD!* |
FileDescription | Steam API |
FileVersion | 6.7.0.0 |
InternalName | steam_api |
LegalCopyright | *!ReLOADeD!* |
OriginalFilename | steam_api |
ProductName | Steam API |
ProductVersion | 6.7.0.0 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
310,303 bytes | 310,784 bytes | 6.46 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D6E4A188081A99C9143F7E60D1CE2E0C |
.rdata |
0x0004d000 |
140,824 bytes | 141,312 bytes | 5.15 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
DDDA6CE46DEA3E6F2FA878F30A7A5089 |
.data |
0x00070000 |
249,240 bytes | 8,192 bytes | 3.37 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
4951C83918DA8AD7BCB3C540D04780F9 |
.pdata |
0x000ad000 |
23,484 bytes | 23,552 bytes | 5.70 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
E33534BCFFCF702B23D68232D741BEFA |
.rsrc |
0x000b3000 |
117,976 bytes | 118,272 bytes | 5.67 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
04EA0B5F0BF7A14EA864217BEEDADD91 |
.RLD0 |
0x000d0000 |
8,504 bytes | 8,704 bytes | 5.66 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
DCEBCD121BFDFEF5F90B237E31F6728B |
.RLD1 |
0x000d3000 |
950,832 bytes | 951,296 bytes | 7.88 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
485CFC9F227F28ACF22EC8A096F2D843 |
.reloc |
0x001bc000 |
9,028 bytes | 9,216 bytes | 5.51 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
960A42F4E7078BF8D8B2CD996658CC7B |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_BITMAP | 3 | 117,048 字节 | |
RT_VERSION | 1 | 668 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁