文件名 | steam_api.dll |
文件类型 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.158.174 |
数据库版本 | 2024-02-10 09:00:50 UTC |
恶意软件家族: Heuristic
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
bc27fd3f9ab67aa73629f775e75b8e93
|
|
SHA1 |
04efb9f6f7fa14db560fde4687d4e9643148955d
|
|
SHA256 |
70b6abddf0f87df04373ff94bed3297e48a9ce3aea88c5a5155e40b083e38c3b
|
|
SHA512 |
f16ba09f374481f6be0bfc18ff94cc89655fe8f10b5473e0ae756ef6762f63b42e4e54f9c70344d3ecd766d2afd8c02563a7f8720bc52bae2a495eb89fce3f84
|
|
ImpHash |
d8915c25ac188dc128947d4e7d30fda4
|
映像基址 | 0x10000000 |
入口点 | 0x10b92af6 |
编译时间 | 2013-10-31 05:32:31 |
校验和 | 0x000aa120 (实际: 0x000aa120) |
操作系统版本 | 5.1 |
PEiD 签名 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
7 库
KERNEL32, USER32, ADVAPI32, SHELL32, WS2_32, WINHTTP, PSAPI |
导出 | 63 函数 |
资源 | 2 资源 |
节 | 8 节 |
CompanyName | Valve Corporation |
FileDescription | Steam Client API (buildbot_winslave04_steam_steam_rel_client_win32@winslave04) |
FileVersion | 1.83.31.47 |
InternalName | Steam Client API |
LegalCopyright | Copyright (C) 1996-2013 Valve Corporation |
OriginalFilename | Steam_API.dll |
ProductName | Steam Client API |
ProductVersion | 1.83.31.47 |
Translation | 0x0804 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
213,220 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x00036000 |
84,059 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x0004b000 |
10,578,660 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.STMSIG |
0x00a62000 |
428 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.THEGFW0 |
0x00a63000 |
564,536 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.THEGFW1 |
0x00aed000 |
688,264 bytes | 688,640 bytes | 7.93 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
6B059937F2CB69BD17423C4372323EFD |
.reloc |
0x00b96000 |
60 bytes | 512 bytes | 0.69 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D8659707F62ED3DA2D0907BD917DC64F |
.rsrc |
0x00b97000 |
1,434 bytes | 1,536 bytes | 3.96 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
1B45CD54DE1E8F7F913CBA40FA209908 |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_VERSION | 1 | 928 字节 | |
RT_MANIFEST | 1 | 346 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁