文件名 | steam_api.dll |
文件类型 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.184.174 |
数据库版本 | 2024-08-09 02:00:20 UTC |
恶意软件家族: Patcher
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
d43c0e8f9853358b436f0a154b9d7f73
|
|
SHA1 |
820abe1b10162ee0b6c0aefea2e08af0efff4960
|
|
SHA256 |
906d66b276d4f151deee6c0fa296199afb592616a6e8e9583da0a08734ea9dfa
|
|
SHA512 |
ccc967ffad569fdd38b9f9e686fb2f771f216f4c2a3a7c4e46c5cd43b1fb89d36f5bbd463c1d192eee292f5f76231fcc5220c9c5d3a1ac8ec8b97d001d2153b9
|
|
ImpHash |
41f7e85f2c04386e57ab33d7a932010b
|
映像基址 | 0x10000000 |
入口点 | 0x100286aa |
编译时间 | 2014-08-19 20:01:38 |
校验和 | 0x00000000 (实际: 0x000e1b40) |
操作系统版本 | 6.0 |
PEiD 签名 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
5 库
KERNEL32, USER32, GDI32, ADVAPI32, SHELL32 |
导出 | 92 函数 |
资源 | 4 资源 |
节 | 7 节 |
CompanyName | *!ReLOADeD!* |
FileDescription | Steam API |
FileVersion | 4,0,0,0 |
InternalName | steam_api |
LegalCopyright | *!ReLOADeD!* |
OriginalFilename | steam_api |
ProductName | Steam API |
ProductVersion | 4,0,0,0 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
205,979 bytes | 206,336 bytes | 6.60 (压缩) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
5C543654C99B14EF4E3946CC1AC8E22C |
.rdata |
0x00034000 |
47,259 bytes | 47,616 bytes | 5.11 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
0BF828A660F79FB78432A0EB2B087637 |
.data |
0x00040000 |
13,616 bytes | 6,144 bytes | 4.06 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
B48EB8643AAD93FEC89E947C06A5B742 |
.rsrc |
0x00044000 |
117,976 bytes | 118,272 bytes | 5.67 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
21C370BC5CD1C26A58E84AFFEEC32DE4 |
.RLD0 |
0x00061000 |
52,668 bytes | 52,736 bytes | 2.50 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
28FCA77B07C845371AB098ED1F61A2E0 |
.RLD1 |
0x0006e000 |
443,790 bytes | 443,904 bytes | 7.87 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D4500A44EFB68B947EB4B435136C83A6 |
.reloc |
0x000db000 |
13,560 bytes | 13,824 bytes | 6.38 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
4D4023A96128369E2CBD8B87FC3D4A4E |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
1 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_BITMAP | 3 | 117,048 字节 | |
RT_VERSION | 1 | 668 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁