文件名 | steam_api.dll |
文件类型 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.172.174 |
数据库版本 | 2024-04-17 15:00:26 UTC |
恶意软件家族: Packed
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
bfee9b4b18f4c7d65137c2dff8d70836
|
|
SHA1 |
559004d8e523c9658ecbbca5d25b4996ce24754a
|
|
SHA256 |
7d0cb1e60e8a1ca2e82ec35b7a971cd52c57c139a194812e249aa68185bf5fd8
|
|
SHA512 |
0399f37d2aecf113836bef2df7f3fb483aeffa24db8d9a70e619702348c9b71f2f249c309aa772b0f9610ade76c33e96ff9df9466b6267e06b4a1c8d266be5ad
|
|
ImpHash |
3542227fcafc90bd1f87ade842c54bf4
|
映像基址 | 0x10000000 |
入口点 | 0x10b20584 |
编译时间 | 2014-11-11 18:54:41 |
校验和 | 0x000b54c7 (实际: 0x000b54c7) |
操作系统版本 | 5.1 |
PEiD 签名 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
7 库
KERNEL32, USER32, ADVAPI32, SHELL32, WS2_32, WINHTTP, PSAPI |
导出 | 101 函数 |
资源 | 2 资源 |
节 | 7 节 |
Comments | ALI213 SpecialBuild |
CompanyName | Valve Corporation |
FileDescription | Steam Client API (buildbot_winslave0213_steam_steam_rel_client_win32@winslave04) |
FileVersion | 2.37.91.26 |
InternalName | Steam Client API |
LegalCopyright | Copyright (C) 1996-2014 Valve Corporation |
OriginalFilename | Steam_API.dll |
ProductName | Steam Client API |
ProductVersion | 2.37.91.26 |
Translation | 0x0804 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
239,812 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0003c000 |
103,403 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00056000 |
10,532,164 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.ALI2130 |
0x00a62000 |
656,420 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.ALI2131 |
0x00b03000 |
704,124 bytes | 704,512 bytes | 7.98 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
F5DC3E292F41A82520B057863815D85F |
.reloc |
0x00baf000 |
268 bytes | 512 bytes | 3.05 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
FE64E65773FA5822F6EB1677D9ADD186 |
.rsrc |
0x00bb0000 |
1,502 bytes | 1,536 bytes | 4.09 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
33C4AF7FDA2F7CBD202C8FE47F42F5DB |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_VERSION | 1 | 996 字节 | |
RT_MANIFEST | 1 | 346 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁