f9e9bed3587c37161958db2e800e1b80c28df8b1450e15c052e13f4ed288c0a9

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2013-Oct-18 14:25:02
Detected languages English - United States
CompanyName *!ReLOADeD!*
FileDescription Steam API
FileVersion 2,1,0,0
InternalName steam_api
LegalCopyright *!ReLOADeD!*
OriginalFilename steam_api
ProductName Steam API
ProductVersion 2,1,0,0

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0
Suspicious PEiD Signature: MoleBox v2.0
Info Cryptographic algorithms detected in the binary: Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .RLD0
Unusual section name found: .RLD1
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryW
Uses Microsoft's cryptographic API:
  • CryptDestroyHash
  • CryptHashData
  • CryptCreateHash
  • CryptImportKey
  • CryptDestroyKey
  • CryptReleaseContext
  • CryptAcquireContextA
  • CryptVerifySignatureA
Suspicious The file contains overlay data. 516 bytes of data starting at offset 0xa0000.
The overlay data has an entropy of 7.60977 and is possibly compressed or encrypted.
Malicious VirusTotal score: 45/71 (Scanned on 2026-03-22 13:35:23) ALYac: Application.Generic.3997786
AVG: Other:PUP-gen [PUP]
Antiy-AVL: HackTool/Win32.Crack
Arcabit: Application.Generic.D3D005A
Avast: Other:PUP-gen [PUP]
BitDefender: Application.Generic.3997786
Bkav: W32.AIDetectMalware
CAT-QuickHeal: PUA.HackTool.S398420
ClamAV: Win.Tool.Gamehack-9886010-0
CrowdStrike: win/grayware_confidence_100% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
ESET-NOD32: Win32/HackTool.Crack.CS potentially unsafe application
Elastic: malicious (high confidence)
Emsisoft: Application.GameHack (A)
Fortinet: Riskware/Crack.BL!tr
GData: Application.Generic.3997786
Google: Detected
Gridinsoft: Crack.Win32.GameHack.dd!n
Ikarus: PUA.HackTool.Steam
Lionic: Hacktool.Win32.Crack.3!c
Malwarebytes: Crack.Trojan.HackTool.DDS
MaxSecure: Trojan.Malware.1380195.susgen
MicroWorld-eScan: Application.Generic.3997786
Microsoft: HackTool:Win32/Keygen!MSR
Paloalto: generic.ml
Rising: Trojan.Wacatac!8.10C01 (CLOUD)
Sangfor: PUP.Win32.Crack.V10s
SentinelOne: Static AI - Suspicious PE
Skyhigh: BehavesLike.Win32.Dropper.jc
Sophos: Steam (PUA)
TACHYON: Trojan/W32.Agent.655876.B
Trapmine: malicious.high.ml.score
TrellixENS: GenericRXWF-WL!879545746BCA
TrendMicro: TROJ_GEN.R014C0CGG23
TrendMicro-HouseCall: TROJ_GEN.R014C0CGG23
VBA32: Trojan.Wacatac
VIPRE: Application.Generic.3997786
Varist: W32/S-7034927e!Eldorado
VirIT: HackTool.Win32.X-Gen.AHDO
Webroot: Riskware.Gamehack.Gen
Xcitium: Malware@#3fbavqdl0rfm3
Yandex: Trojan.Dynamer!cbZ3xcw3O+Y
alibabacloud: HackTool:Win/Crack.CB

Hashes

MD5 879545746bca5c6d2410ead5c063d1fa
SHA1 e263207d94a2b691432027328a0dc217d3ae5536
SHA256 f9e9bed3587c37161958db2e800e1b80c28df8b1450e15c052e13f4ed288c0a9
SHA3 6d6bb2586a25f2ece64b51d4316501107752e67dd7e98b94c2a43ae77462b7f9
SSDeep 12288:JeBT3lgT996SDt3S8aKYqK/cP+cljt10oFu+ZFCyatk1nq:w3lgT6NK5p2cdb0tixq
Imports Hash e533f117e969fe71c98d5755d99aaa72

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 7
TimeDateStamp 2013-Oct-18 14:25:02
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 11.0
SizeOfCode 0x25200
SizeOfInitializedData 0x36000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0001B33A (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x27000
ImageBase 0x10000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xa6000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 e96cea593493bd361e579f8846676281
SHA1 c14d9e1e1f9c5be46d21f3c460b6346b2ef85502
SHA256 4e5e3bd99bbabef30b531abd171adcf858284f5b5c340c80a94563463a940de7
SHA3 e7edaeefeddc233a63c31741b819c93ed1d2c2af3b1a896c9bbcb0756ec0460d
VirtualSize 0x2510b
VirtualAddress 0x1000
SizeOfRawData 0x25200
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.5593

.rdata

MD5 5a36619b750b3f8345d73226fb82748c
SHA1 f765fb4eca99bb8665ca36199200ba77dc98b16f
SHA256 88eb7a4aa6219eee10f41bbd1f3d23300502a41c6b3de95994eb6e6487e58d2c
SHA3 9dcf664d310db607719a7d2907bf7ca988a95b4834fefd6196d5a240af7b74e7
VirtualSize 0xa97a
VirtualAddress 0x27000
SizeOfRawData 0xaa00
PointerToRawData 0x25600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.99464

.data

MD5 1a510306a6c239f1b19a99916eb7c142
SHA1 f622973743756671c42ee6a1f1142bd2ad96ab90
SHA256 b6e815ed28ad2106eaedd094808294f94cca6b3027c9ff1053a935a9e0d23327
SHA3 b985a2431b24d55108d630b1eda9034e2152a1dd4e1acabadf6f93b1d2cfdccb
VirtualSize 0x3350
VirtualAddress 0x32000
SizeOfRawData 0x1600
PointerToRawData 0x30000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.96837

.rsrc

MD5 1c7fa9751a58988699487805bad59167
SHA1 317791b085e8280e227ec1590676407141ea3ff1
SHA256 93bd8641b3c21e5126c4183240ca990a35f0c6e33ca856fa4391e517fa4e6730
SHA3 e75881518a88450891358a7d07ecce320efb5145f796cd3f88aee0e02e9af92c
VirtualSize 0x1ccd8
VirtualAddress 0x36000
SizeOfRawData 0x1ce00
PointerToRawData 0x31600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.67043

.RLD0

MD5 c0b8f1a082c70d9a55d93d5449f8d034
SHA1 2808a04d13fa858ef560b6e7a85aa0fb31fa574d
SHA256 71eee683c11ec676ae26579b0c02caa6cd9829537cba2075d636bfa26bac0e4e
SHA3 96230148531029e6286984ffb58742702b7f7f8a86dce0fa62f469e06c0c8604
VirtualSize 0xb354
VirtualAddress 0x53000
SizeOfRawData 0xb400
PointerToRawData 0x4e400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 2.47444

.RLD1

MD5 1ba6fd3915dd2286cf2c621f601e6ad8
SHA1 46a5fc965884421d5f0ce4fac4ab62e21646d2ef
SHA256 7b9bcf86d5db426a46e266dda7a2dd78355f5407a7afb24912d93aab7d881d37
SHA3 903fccdf1f0ba7eadb3d8f4046e39ab1c8dfeb88f9121c7283e8180cca99e7e7
VirtualSize 0x436cb
VirtualAddress 0x5f000
SizeOfRawData 0x43800
PointerToRawData 0x59800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.74263

.reloc

MD5 c730d9f351d72cb5202ba7ed01c85f22
SHA1 7d72f2946be151fcbfd58f9619caf5e319780a1c
SHA256 728bd93c82df2e0727e72997ea2a0598cbbdd4ff0535f341071d01f5fd9fb1ca
SHA3 a70b8632164c22220d7631c474a4cbece7a8d2fe8738609cc303c14a6d48a6b3
VirtualSize 0x2ee0
VirtualAddress 0xa3000
SizeOfRawData 0x3000
PointerToRawData 0x9d000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.36928

Imports

KERNEL32.dll GetModuleHandleA
LoadLibraryA
GetProcessTimes
GetCurrentProcess
GetSystemTimeAsFileTime
GetTickCount
GetSystemPowerStatus
GetLastError
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetFileTime
ReadFile
WriteConsoleW
SetStdHandle
SetFileAttributesA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetModuleFileNameA
FindClose
VirtualFree
GetConsoleMode
GetConsoleCP
CreateFileA
SetEndOfFile
SetFilePointerEx
WriteFile
GetFileSizeEx
VirtualAlloc
CloseHandle
HeapAlloc
HeapFree
GetProcessHeap
HeapDestroy
HeapCreate
RaiseException
WideCharToMultiByte
MultiByteToWideChar
QueryPerformanceCounter
WritePrivateProfileStructA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileStructA
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
HeapSize
Sleep
IsDebuggerPresent
SetLastError
InterlockedIncrement
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
GetStringTypeW
FlushFileBuffers
CreateFileW
USER32.dll LoadBitmapA
GDI32.dll DeleteObject
GetBitmapBits
ADVAPI32.dll CryptDestroyHash
CryptHashData
CryptCreateHash
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptVerifySignatureA
SHELL32.dll SHGetSpecialFolderPathA

Delayed Imports

GetHSteamPipe

Ordinal 1
Address 0x111d0

GetHSteamUser

Ordinal 2
Address 0x112f0

SteamAPI_GetHSteamPipe

Ordinal 3
Address 0x111d0

SteamAPI_GetHSteamUser

Ordinal 4
Address 0x112f0

SteamAPI_GetSteamInstallPath

Ordinal 5
Address 0x11010

SteamAPI_Init

Ordinal 6
Address 0x11020

SteamAPI_InitSafe

Ordinal 7
Address 0x11020

SteamAPI_IsSteamRunning

Ordinal 8
Address 0x113c0

SteamAPI_RegisterCallResult

Ordinal 9
Address 0x11030

SteamAPI_RegisterCallback

Ordinal 10
Address 0x11050

SteamAPI_RestartAppIfNecessary

Ordinal 11
Address 0x11070

SteamAPI_RunCallbacks

Ordinal 12
Address 0x11090

SteamAPI_SetBreakpadAppID

Ordinal 13
Address 0x11260

SteamAPI_SetMiniDumpComment

Ordinal 14
Address 0x11260

SteamAPI_SetTryCatchCallbacks

Ordinal 15
Address 0x110a0

SteamAPI_Shutdown

Ordinal 16
Address 0x11260

SteamAPI_UnregisterCallResult

Ordinal 17
Address 0x110c0

SteamAPI_UnregisterCallback

Ordinal 18
Address 0x110e0

SteamAPI_UseBreakpadCrashHandler

Ordinal 19
Address 0x11260

SteamAPI_WriteMiniDump

Ordinal 20
Address 0x11260

SteamApps

Ordinal 21
Address 0x11160

SteamClient

Ordinal 22
Address 0x11100

SteamContentServer

Ordinal 23
Address 0x11110

SteamContentServerUtils

Ordinal 24
Address 0x111a0

SteamContentServer_Init

Ordinal 25
Address 0x11120

SteamContentServer_RunCallbacks

Ordinal 26
Address 0x11090

SteamContentServer_Shutdown

Ordinal 27
Address 0x11260

SteamFriends

Ordinal 28
Address 0x11140

SteamGameServer

Ordinal 29
Address 0x11150

SteamGameServerApps

Ordinal 30
Address 0x11160

SteamGameServerHTTP

Ordinal 31
Address 0x11170

SteamGameServerNetworking

Ordinal 32
Address 0x11180

SteamGameServerStats

Ordinal 33
Address 0x11190

SteamGameServerUtils

Ordinal 34
Address 0x111a0

SteamGameServer_BSecure

Ordinal 35
Address 0x111b0

SteamGameServer_GetHSteamPipe

Ordinal 36
Address 0x111d0

SteamGameServer_GetHSteamUser

Ordinal 37
Address 0x112f0

SteamGameServer_GetIPCCallCount

Ordinal 38
Address 0x18f30

SteamGameServer_GetSteamID

Ordinal 39
Address 0x111f0

SteamGameServer_Init

Ordinal 40
Address 0x11220

SteamGameServer_InitSafe

Ordinal 41
Address 0x11220

SteamGameServer_RunCallbacks

Ordinal 42
Address 0x11250

SteamGameServer_Shutdown

Ordinal 43
Address 0x11260

SteamHTTP

Ordinal 44
Address 0x11170

SteamMasterServerUpdater

Ordinal 45
Address 0x11270

SteamMatchmaking

Ordinal 46
Address 0x11280

SteamMatchmakingServers

Ordinal 47
Address 0x11290

SteamNetworking

Ordinal 48
Address 0x11180

SteamRemoteStorage

Ordinal 49
Address 0x112a0

SteamScreenshots

Ordinal 50
Address 0x112b0

SteamUnifiedMessages

Ordinal 51
Address 0x112c0

SteamUser

Ordinal 52
Address 0x112d0

SteamUserStats

Ordinal 53
Address 0x112e0

SteamUtils

Ordinal 54
Address 0x111a0

Steam_GetHSteamUserCurrent

Ordinal 55
Address 0x112f0

Steam_RegisterInterfaceFuncs

Ordinal 56
Address 0x11260

Steam_RunCallbacks

Ordinal 57
Address 0x11310

g_pSteamClientGameServer

Ordinal 58
Address 0x334a4

100

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0xc28
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.61927
MD5 7d74ae0b94636225b1bf4c99eddb5163
SHA1 ed0a9f7dcb6bfd35fc683d5682f682420d67e8af
SHA256 65d0b0d12908067e0ed41d5c91c9d8da917970b0d79d1801acbb1c817481165d
SHA3 97b7de57b4824104adb19342c8702a8e2a234c088b30ef466ec09f59009eb88a
Preview

101

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0x3028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.09435
MD5 560d363e92c1f3406085c47af2364154
SHA1 8145583845e837712bec45aeca822093a8fd26f3
SHA256 a5ec848fe6d69b1c4c2680000b56d705ed118f1fbffcd93b4dad575dd1949ec2
SHA3 c82e6928d2eb193e9ab71b3c641f1e93126d76fd3ce69f1cc4afdbdcc68048b4
Preview

102

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0x18ce8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.49946
MD5 b1146875fb71dd5eef452daa75437092
SHA1 cfd3451482aa74e5efb0fd83791a2d9a0973bb45
SHA256 49d16dbd833eab564968c17c9f4dd0d0719380cf10f918a6e74fca2cb9a5636e
SHA3 efb53608f58d3ccd5308379ca4147b1f26ef052fe992b7f0f6bac5a4d4cc0fad
Preview

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x29c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33293
MD5 e4ba3421076d50a4eb2720e0af8bb7f3
SHA1 f848e8b77fcc12583afdb591bcec6cfda71c5ac9
SHA256 6ff00d6b6040dc1d89cb469e9b5563b0009e8eec9a58d6cf172e851f5c00f7b0
SHA3 ce7805e2dcb2cb97fbd225b168f726e71ea069a569a4222be7deea92ab376ade

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 2.1.0.0
ProductVersion 2.1.0.0
FileFlags VS_FF_PATCHED
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
CompanyName *!ReLOADeD!*
FileDescription Steam API
FileVersion (#2) 2,1,0,0
InternalName steam_api
LegalCopyright *!ReLOADeD!*
OriginalFilename steam_api
ProductName Steam API
ProductVersion (#2) 2,1,0,0
Resource LangID English - United States

TLS Callbacks

Load Configuration

Size 0x48
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x10032150
SEHandlerTable 0
SEHandlerCount 0

RICH Header

XOR Key 0xeb84f42d
Unmarked objects 0
ASM objects (50929) 17
C objects (50929) 103
C++ objects (50929) 37
210 (VS2012 UPD3 build 60610) 7
Total imports 121
185 (30716) 11
C++ objects (VS2012 UPD3 build 60610) 133
Exports (VS2012 UPD3 build 60610) 1
Resource objects (VS2012 UPD3 build 60610) 1
Linker (VS2012 UPD3 build 60610) 1

Errors

Leave a comment

No comments yet.