7a7775d4b0b5b708cb195b5d024c762d

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2014-May-01 17:48:59
Detected languages English - United States
CompanyName *!ReLOADeD!*
FileDescription Steam API
FileVersion 3,1,0,0
InternalName steam_api
LegalCopyright *!ReLOADeD!*
OriginalFilename steam_api
ProductName Steam API
ProductVersion 3,1,0,0

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious PEiD Signature: MoleBox v2.0
Info Cryptographic algorithms detected in the binary: Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .RLD0
Unusual section name found: .RLD1
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryW
Uses Microsoft's cryptographic API:
  • CryptDestroyHash
  • CryptHashData
  • CryptCreateHash
  • CryptImportKey
  • CryptDestroyKey
  • CryptReleaseContext
  • CryptAcquireContextA
  • CryptVerifySignatureA
Suspicious The file contains overlay data. 516 bytes of data starting at offset 0xcd800.
The overlay data has an entropy of 7.63306 and is possibly compressed or encrypted.
Malicious VirusTotal score: 36/71 (Scanned on 2024-02-16 13:56:29) Antiy-AVL: Trojan/Win32.TSGeneric
Bkav: W32.AIDetectMalware
CAT-QuickHeal: PUA.HackTool.S398420
ClamAV: Win.Tool.Gamehack-9886010-0
CrowdStrike: win/grayware_confidence_100% (W)
Cylance: unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
ESET-NOD32: a variant of Win32/HackTool.Crack.CS potentially unsafe
Elastic: malicious (high confidence)
Emsisoft: Application.GameHack (A)
FireEye: Generic.mg.7a7775d4b0b5b708
Fortinet: Riskware/Crack
Google: Detected
Gridinsoft: Crack.Win32.GameHack.dd!n
Ikarus: PUA.HackTool.Steam
K7AntiVirus: Hacktool ( 004954941 )
K7GW: Hacktool ( 004954941 )
Lionic: Hacktool.Win32.Crack.3!c
Malwarebytes: Generic.Malware.AI.DDS
McAfee: Crack-Reloaded
Microsoft: HackTool:Win32/Crack!pz
Panda: Trj/CI.A
Rising: Trojan.Generic@AI.93 (RDMK:EweHHP3hykZu4la6uMuDaw)
Sangfor: Trojan.Win32.Save.a
SentinelOne: Static AI - Malicious PE
Skyhigh: BehavesLike.Win32.Dropper.cc
Sophos: Steam (PUA)
Symantec: ML.Attribute.HighConfidence
Trapmine: malicious.high.ml.score
TrendMicro: TROJ_GEN.R002C0PLV23
TrendMicro-HouseCall: TROJ_GEN.R002C0PLV23
Varist: W32/S-7034927e!Eldorado
Webroot: Riskware.Gamehack.Gen
Xcitium: ApplicUnwnt@#2rx34ibs748yn
Yandex: PUP.Crack!8ScGCDdLIzM

Hashes

MD5 7a7775d4b0b5b708cb195b5d024c762d
SHA1 5de180295d2c7fca478f0c29c3ce9bd6b4b6a077
SHA256 00e18cec491aef23f904679eee5a13b3c0e33a0708620896a1b86c4abea9a7ac
SHA3 fa644f740b7162b9c2fa8a7d8c2dc37c452ce5020a1ea7e5dcef2d031f5ec011
SSDeep 12288:MQP80WCZ3BmBbNMlXElt3S4m8VW63sS6OITl104lNym1oiop6MI7oz1rN:MQ1BmDMyg8SS6O21Xlb13wS7grN
Imports Hash 41f7e85f2c04386e57ab33d7a932010b

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 7
TimeDateStamp 2014-May-01 17:48:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 11.0
SizeOfCode 0x2fa00
SizeOfInitializedData 0x37a00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00025B3A (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x31000
ImageBase 0x10000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xd4000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 72843e35ac5513b920f14ca0ea0253ee
SHA1 e2f4208b6da008f356fb1147f1abfa91196cb3b7
SHA256 863bb26ee877e251ccd5fdacdaffdda8f388efc2a52048f10ae09a8867a715e8
SHA3 d04c9267fddfd8099e62b8e36f9e16a335ab19c174089e965d47b4f77c30dd74
VirtualSize 0x2f9db
VirtualAddress 0x1000
SizeOfRawData 0x2fa00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.60437

.rdata

MD5 3a0ea9c1f52c0939eed35188435781cd
SHA1 ab21cecae8a2a0709a0d32c1619463aa7e99be4e
SHA256 3e9a2edeb3797e04ac4f93359b7f62c34714f854d6703de5fa3ecaa0afbfb074
SHA3 f3a3605f43d29faa5ac7ff0cf920c6a47d30ec30a8295428864b0f0111d6b3c2
VirtualSize 0xb0d0
VirtualAddress 0x31000
SizeOfRawData 0xb200
PointerToRawData 0x2fe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.01073

.data

MD5 8ce3e662420636a79828f97e730f364e
SHA1 e7d0957db4dff6af7b49659c94fe2b42f4a7b16c
SHA256 7618943128c09cc422e744ac8b467f212074dbadd8b3b464ddea527e21855ac7
SHA3 56efe5f1740b9ec172a0633f455624eb4011e303fcb0e4e50a0d712937374576
VirtualSize 0x3530
VirtualAddress 0x3d000
SizeOfRawData 0x1800
PointerToRawData 0x3b000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.03061

.rsrc

MD5 d36c58557dc75b74f3a68ea8b931d284
SHA1 7dc2d1321f1dbd47866fa836b952abb09e05babe
SHA256 07acca6b8372bb0d29c184da09f14f25a804666d26e0d49d910e367a1f2a5e97
SHA3 db309a0cd6d8de02eccd1ce2153d503c35338f7f99448ca7421e71acbbdaac2e
VirtualSize 0x1ccd8
VirtualAddress 0x41000
SizeOfRawData 0x1ce00
PointerToRawData 0x3c800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.67032

.RLD0

MD5 654b1fd38bf258b5f284aa09e9ee64a8
SHA1 0adf569afeddf37280bef978b2b315c2f6aa3268
SHA256 5890f78a1d24e36694b0dbcee2b39202ce53c9d2595a1d96d6cd1589090fa38f
SHA3 1ef13758b6969c96ded0c40f82f0dddb1a86ecaf5896a2526728794da30c0ca3
VirtualSize 0xc39c
VirtualAddress 0x5e000
SizeOfRawData 0xc400
PointerToRawData 0x59600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 2.54008

.RLD1

MD5 ae2aa719de42a6bbdc5648efcc8338ea
SHA1 ccb9c80ca09886e25036829a96406ff676fef34d
SHA256 9a1f1721f1cfa46d132ac227b55b0af97073e7295069c69aa0dcc43c57557270
SHA3 724b2e710efcbb63392d8ce6375698c4be1fb5d59c4ba94cc320483ff6c6ac04
VirtualSize 0x64615
VirtualAddress 0x6b000
SizeOfRawData 0x64800
PointerToRawData 0x65a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.82644

.reloc

MD5 260a319f71399382dbd5918f0e9745a8
SHA1 400a4adf3e92014c4abab5dafaa19efc9d3bc1b8
SHA256 a329632df614a3435f5d2e31da6e392c1ece2ed3b6d13216f0559bc7edfe4377
SHA3 1859b6d933f8e6c29d15effe2f6b3f2048c221248462a44c9dc95ed5ef10e67f
VirtualSize 0x343c
VirtualAddress 0xd0000
SizeOfRawData 0x3600
PointerToRawData 0xca200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.35667

Imports

KERNEL32.dll GetModuleHandleA
LoadLibraryA
CopyFileA
GetProcessTimes
GetCurrentProcess
GetSystemTimeAsFileTime
GetTickCount
GetSystemPowerStatus
FindClose
GetLastError
FindNextFileA
GetDiskFreeSpaceExA
GetFileTime
ReadFile
CloseHandle
IsBadReadPtr
WriteConsoleW
SetStdHandle
SetFileAttributesA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetModuleFileNameA
FindFirstFileA
VirtualFree
GetConsoleMode
GetConsoleCP
CreateFileA
SetEndOfFile
SetFilePointerEx
WriteFile
GetFileSizeEx
VirtualAlloc
HeapAlloc
HeapFree
GetProcessHeap
HeapDestroy
HeapCreate
RaiseException
WideCharToMultiByte
MultiByteToWideChar
QueryPerformanceCounter
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
HeapSize
Sleep
IsDebuggerPresent
SetLastError
InterlockedIncrement
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
GetStringTypeW
FlushFileBuffers
CreateFileW
USER32.dll LoadBitmapA
GDI32.dll DeleteObject
GetBitmapBits
ADVAPI32.dll CryptDestroyHash
CryptHashData
CryptCreateHash
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptVerifySignatureA
SHELL32.dll SHGetSpecialFolderPathA

Delayed Imports

Ordinal 1
Address 0x16100

g_pSteamClientGameServer

Ordinal 2
Address 0x3e668

GetHSteamPipe

Ordinal 3
Address 0x16120

GetHSteamUser

Ordinal 4
Address 0x16320

SteamAPI_GetHSteamPipe

Ordinal 5
Address 0x16120

SteamAPI_GetHSteamUser

Ordinal 6
Address 0x16320

SteamAPI_GetSteamInstallPath

Ordinal 7
Address 0x16140

SteamAPI_Init

Ordinal 8
Address 0x16150

SteamAPI_InitSafe

Ordinal 9
Address 0x16150

SteamAPI_IsSteamRunning

Ordinal 10
Address 0x202e0

SteamAPI_RegisterCallResult

Ordinal 11
Address 0x16160

SteamAPI_RegisterCallback

Ordinal 12
Address 0x16180

SteamAPI_RestartAppIfNecessary

Ordinal 13
Address 0x161a0

SteamAPI_RunCallbacks

Ordinal 14
Address 0x161b0

SteamAPI_SetBreakpadAppID

Ordinal 15
Address 0x16270

SteamAPI_SetMiniDumpComment

Ordinal 16
Address 0x16270

SteamAPI_SetTryCatchCallbacks

Ordinal 17
Address 0x161c0

SteamAPI_Shutdown

Ordinal 18
Address 0x161e0

SteamAPI_UnregisterCallResult

Ordinal 19
Address 0x161f0

SteamAPI_UnregisterCallback

Ordinal 20
Address 0x16210

SteamAPI_UseBreakpadCrashHandler

Ordinal 21
Address 0x16270

SteamAPI_WriteMiniDump

Ordinal 22
Address 0x16270

SteamApps

Ordinal 23
Address 0x162b0

SteamClient

Ordinal 24
Address 0x16230

SteamContentServer

Ordinal 25
Address 0x16240

SteamContentServerUtils

Ordinal 26
Address 0x162f0

SteamContentServer_Init

Ordinal 27
Address 0x16250

SteamContentServer_RunCallbacks

Ordinal 28
Address 0x161b0

SteamContentServer_Shutdown

Ordinal 29
Address 0x16270

SteamController

Ordinal 30
Address 0x16280

SteamFriends

Ordinal 31
Address 0x16290

SteamGameServer

Ordinal 32
Address 0x162a0

SteamGameServerApps

Ordinal 33
Address 0x162b0

SteamGameServerHTTP

Ordinal 34
Address 0x162c0

SteamGameServerNetworking

Ordinal 35
Address 0x162d0

SteamGameServerStats

Ordinal 36
Address 0x162e0

SteamGameServerUtils

Ordinal 37
Address 0x162f0

SteamGameServer_BSecure

Ordinal 38
Address 0x16300

SteamGameServer_GetHSteamPipe

Ordinal 39
Address 0x16120

SteamGameServer_GetHSteamUser

Ordinal 40
Address 0x16320

SteamGameServer_GetIPCCallCount

Ordinal 41
Address 0x16340

SteamGameServer_GetSteamID

Ordinal 42
Address 0x16360

SteamGameServer_Init

Ordinal 43
Address 0x16390

SteamGameServer_InitSafe

Ordinal 44
Address 0x16390

SteamGameServer_RunCallbacks

Ordinal 45
Address 0x163c0

SteamGameServer_Shutdown

Ordinal 46
Address 0x16270

SteamHTTP

Ordinal 47
Address 0x162c0

SteamMasterServerUpdater

Ordinal 48
Address 0x163d0

SteamMatchmaking

Ordinal 49
Address 0x163e0

SteamMatchmakingServers

Ordinal 50
Address 0x163f0

SteamNetworking

Ordinal 51
Address 0x162d0

SteamRemoteStorage

Ordinal 52
Address 0x16400

SteamScreenshots

Ordinal 53
Address 0x16410

SteamUGC

Ordinal 54
Address 0x16420

SteamUnifiedMessages

Ordinal 55
Address 0x16430

SteamUser

Ordinal 56
Address 0x16440

SteamUserStats

Ordinal 57
Address 0x16450

SteamUtils

Ordinal 58
Address 0x162f0

Steam_GetHSteamUserCurrent

Ordinal 59
Address 0x16320

Steam_RegisterInterfaceFuncs

Ordinal 60
Address 0x16270

Steam_RunCallbacks

Ordinal 61
Address 0x16460

VR_GetControlPanel

Ordinal 62
Address 0x16490

VR_Init

Ordinal 63
Address 0x164b0

VR_Shutdown

Ordinal 64
Address 0x16270

100

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0xc28
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.61927
MD5 7d74ae0b94636225b1bf4c99eddb5163
SHA1 ed0a9f7dcb6bfd35fc683d5682f682420d67e8af
SHA256 65d0b0d12908067e0ed41d5c91c9d8da917970b0d79d1801acbb1c817481165d
SHA3 97b7de57b4824104adb19342c8702a8e2a234c088b30ef466ec09f59009eb88a
Preview

101

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0x3028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.09435
MD5 560d363e92c1f3406085c47af2364154
SHA1 8145583845e837712bec45aeca822093a8fd26f3
SHA256 a5ec848fe6d69b1c4c2680000b56d705ed118f1fbffcd93b4dad575dd1949ec2
SHA3 c82e6928d2eb193e9ab71b3c641f1e93126d76fd3ce69f1cc4afdbdcc68048b4
Preview

102

Type RT_BITMAP
Language English - United States
Codepage UNKNOWN
Size 0x18ce8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.49946
MD5 b1146875fb71dd5eef452daa75437092
SHA1 cfd3451482aa74e5efb0fd83791a2d9a0973bb45
SHA256 49d16dbd833eab564968c17c9f4dd0d0719380cf10f918a6e74fca2cb9a5636e
SHA3 efb53608f58d3ccd5308379ca4147b1f26ef052fe992b7f0f6bac5a4d4cc0fad
Preview

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x29c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.33892
MD5 f3fcf6a8b0db65f6d5a069de3afc37e7
SHA1 e52547c071f3bea114a24c11001e3f8ec07190c3
SHA256 f106bc0cc0d213ea9494238853d4d8f280b96ee5d3ba9d3c1dc02e6483b0a729
SHA3 fac6c467b34b1bf9ab8954d2effda24eb9d3a1daae67d227eeeb0707c007fdf8

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.1.0.0
ProductVersion 3.1.0.0
FileFlags VS_FF_PATCHED
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
CompanyName *!ReLOADeD!*
FileDescription Steam API
FileVersion (#2) 3,1,0,0
InternalName steam_api
LegalCopyright *!ReLOADeD!*
OriginalFilename steam_api
ProductName Steam API
ProductVersion (#2) 3,1,0,0
Resource LangID English - United States

TLS Callbacks

Load Configuration

Size 0x48
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1003d150
SEHandlerTable 0
SEHandlerCount 0

RICH Header

XOR Key 0x91b0121
Unmarked objects 0
ASM objects (50929) 17
C objects (50929) 103
C++ objects (50929) 37
210 (VS2012 UPD3 build 60610) 9
Total imports 122
185 (30716) 11
C++ objects (VS2012 UPD3 build 60610) 142
Exports (VS2012 UPD3 build 60610) 1
Resource objects (VS2012 UPD3 build 60610) 1
Linker (VS2012 UPD3 build 60610) 1

Errors

[*] Warning: Raw bytes from section .text could not be obtained.
<-- -->