| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2026-Apr-27 19:53:40 |
| Detected languages |
English - United States
|
| TLS Callbacks | 6 callback(s) detected. |
| Debug artifacts |
chrome_pwa_launcher.exe.pdb
|
| CompanyName | The Chromium-Gost Authors |
| FileDescription | Chromium-Gost |
| FileVersion | 146.0.7680.216 |
| InternalName | chrome_pwa_launcher |
| LegalCopyright | Copyright 2026 The Chromium-Gost Authors. All rights reserved. |
| OriginalFilename | chrome_pwa_launcher.exe |
| ProductName | Chromium-Gost |
| ProductVersion | 146.0.7680.216 |
| CompanyShortName | The Chromium-Gost Authors |
| ProductShortName | Chromium-Gost |
| LastChange | ff9214069a282850ff7ebbef6615bb009cf45c57-refs/branch-heads/7680@{#4013} |
| Official Build | 1 |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Uses constants related to MD5 Uses constants related to SHA1 Uses constants related to SHA256 Uses constants related to SHA512 |
| Suspicious | The PE is possibly packed. |
Unusual section name found: .fptable
Unusual section name found: LZMADEC Unusual section name found: malloc_h |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Info | The PE is digitally signed. |
Signer: CRYPTO-PRO LLC
Issuer: GlobalSign GCC R45 EV CodeSigning CA 2020 |
| Safe | VirusTotal score: 0/71 (Scanned on 2026-05-13 07:16:14) | All the AVs think this file is safe. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x78 |
| e_cp | 0x1 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0 |
| e_ss | 0 |
| e_sp | 0 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x78 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 11 |
| TimeDateStamp | 2026-Apr-27 19:53:40 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x1c2800 |
| SizeOfInitializedData | 0x9b800 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00000000001123B0 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | A.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | A.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x289000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x266399 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| ADVAPI32.dll |
CreateProcessAsUserW
RegCloseKey RegCreateKeyExW RegOpenKeyExW RegQueryValueExW RegSetValueExW |
|---|---|
| dbghelp.dll |
SymCleanup
SymFromAddr SymGetLineFromAddr64 SymGetModuleInfo64 SymGetSearchPathW SymInitialize SymSetOptions SymSetSearchPathW |
| KERNEL32.dll |
AcquireSRWLockExclusive
AssignProcessToJobObject CloseHandle CompareStringW CreateEventW CreateFileW CreateIoCompletionPort CreateProcessW CreateThread DeleteCriticalSection DeleteFileW DeleteProcThreadAttributeList DuplicateHandle EncodePointer EnterCriticalSection EnumSystemLocalesW ExitProcess ExpandEnvironmentStringsW FindClose FindFirstFileExW FindNextFileW FlsAlloc FlsFree FlsGetValue FlsSetValue FlushFileBuffers FormatMessageW FreeEnvironmentStringsW FreeLibrary GetACP GetCPInfo GetCommandLineA GetCommandLineW GetConsoleMode GetConsoleOutputCP GetCurrentDirectoryW GetCurrentProcess GetCurrentProcessId GetCurrentThread GetCurrentThreadId GetDateFormatW GetDriveTypeW GetEnvironmentStringsW GetEnvironmentVariableW GetExitCodeProcess GetFileAttributesW GetFileInformationByHandle GetFileSizeEx GetFileType GetFullPathNameW GetLastError GetLocalTime GetLocaleInfoW GetLogicalProcessorInformation GetModuleFileNameW GetModuleHandleA GetModuleHandleExW GetModuleHandleW GetNativeSystemInfo GetOEMCP GetProcAddress GetProcessHeap GetProcessId GetProductInfo GetQueuedCompletionStatus GetStartupInfoW GetStdHandle GetStringTypeW GetSystemDirectoryW GetSystemInfo GetSystemTimeAsFileTime GetTempPathW GetThreadContext GetThreadId GetThreadPriority GetThreadPriorityBoost GetTickCount GetTimeFormatW GetTimeZoneInformation GetUserDefaultLCID GetVersionExW GetWindowsDirectoryW GlobalMemoryStatusEx InitOnceExecuteOnce InitializeConditionVariable InitializeCriticalSection InitializeCriticalSectionAndSpinCount InitializeCriticalSectionEx InitializeProcThreadAttributeList InitializeSListHead IsDebuggerPresent IsProcessorFeaturePresent IsValidCodePage IsValidLocale IsWow64Process K32GetModuleInformation LCMapStringW LeaveCriticalSection LoadLibraryExA LoadLibraryExW LoadLibraryW LocalFree MultiByteToWideChar OutputDebugStringA PostQueuedCompletionStatus QueryPerformanceCounter QueryPerformanceFrequency QueryThreadCycleTime RaiseException ReadConsoleW ReadFile ReleaseSRWLockExclusive ResetEvent ResumeThread RtlCaptureContext RtlCaptureStackBackTrace RtlLookupFunctionEntry RtlPcToFileHeader RtlUnwind RtlUnwindEx RtlVirtualUnwind SetEndOfFile SetEnvironmentVariableW SetEvent SetFilePointerEx SetHandleInformation SetInformationJobObject SetLastError SetStdHandle SetThreadInformation SetThreadPriority SetThreadPriorityBoost SetUnhandledExceptionFilter Sleep SleepConditionVariableSRW SuspendThread SwitchToThread TerminateProcess TlsAlloc TlsFree TlsGetValue TlsSetValue TryAcquireSRWLockExclusive UnhandledExceptionFilter UnregisterWaitEx UpdateProcThreadAttribute VirtualAlloc VirtualFree VirtualProtect VirtualQuery WaitForMultipleObjects WaitForSingleObject WakeAllConditionVariable WakeConditionVariable WideCharToMultiByte WriteConsoleW WriteFile |
| WINMM.dll |
timeBeginPeriod
timeEndPeriod timeGetTime |
| USERENV.dll |
CreateEnvironmentBlock
DestroyEnvironmentBlock |
| USER32.dll |
AllowSetForegroundWindow
CreateWindowExW DefWindowProcW DestroyWindow DispatchMessageW GetActiveWindow GetQueueStatus KillTimer MsgWaitForMultipleObjectsEx PeekMessageW PostMessageW PostQuitMessage RegisterClassExW SetTimer TranslateMessage UnregisterClassW |
| SHELL32.dll |
CommandLineToArgvW
SHGetFolderPathW SHGetKnownFolderPath ShellExecuteExW |
| ole32.dll |
CoInitializeEx
CoRegisterInitializeSpy CoRevokeInitializeSpy CoTaskMemFree CoUninitialize |
| ntdll.dll |
NtClose
NtOpenKeyEx NtQueryValueKey RtlFormatCurrentUserKeyPath RtlFreeUnicodeString RtlInitUnicodeString |
| api-ms-win-core-winrt-l1-1-0.dll |
RoInitialize
RoUninitialize |
| Ordinal | 1 |
|---|---|
| Address | 0x64070 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 146.0.7680.216 |
| ProductVersion | 146.0.7680.216 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| CompanyName | The Chromium-Gost Authors |
| FileDescription | Chromium-Gost |
| FileVersion (#2) | 146.0.7680.216 |
| InternalName | chrome_pwa_launcher |
| LegalCopyright | Copyright 2026 The Chromium-Gost Authors. All rights reserved. |
| OriginalFilename | chrome_pwa_launcher.exe |
| ProductName | Chromium-Gost |
| ProductVersion (#2) | 146.0.7680.216 |
| CompanyShortName | The Chromium-Gost Authors |
| ProductShortName | Chromium-Gost |
| LastChange | ff9214069a282850ff7ebbef6615bb009cf45c57-refs/branch-heads/7680@{#4013} |
| Official Build | 1 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-27 19:53:40 |
| Version | 0.0 |
| SizeofData | 52 |
| AddressOfRawData | 0x1ed7e8 |
| PointerToRawData | 0x1ec3e8 |
| Referenced File | chrome_pwa_launcher.exe.pdb |
| StartAddressOfRawData | 0x14023e000 |
|---|---|
| EndAddressOfRawData | 0x14023e250 |
| AddressOfIndex | 0x14020c648 |
| AddressOfCallbacks | 0x1401ef1f0 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_16BYTES
|
| Callbacks |
0x000000014008AEB0
0x0000000140110D10 0x000000014008AB30 0x0000000140110A20 0x000000014002D770 0x0000000140087610 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x1401fb040 |
| GuardCFCheckFunctionPointer | 5370736944 |
| GuardCFDispatchFunctionPointer | 0 |
| GuardCFFunctionTable | 0 |
| GuardCFFunctionCount | 0 |
| GuardFlags | (EMPTY) |
| CodeIntegrity.Flags | 0 |
| CodeIntegrity.Catalog | 0 |
| CodeIntegrity.CatalogOffset | 0 |
| CodeIntegrity.Reserved | 0 |
| GuardAddressTakenIatEntryTable | 0 |
| GuardAddressTakenIatEntryCount | 0 |
| GuardLongJumpTargetTable | 0 |
| GuardLongJumpTargetCount | 0 |
No comments yet.