28d81d42fedfec3342bc636fb17b6488a78af5656be3243a4779176122963a82

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-27 19:53:40
Detected languages English - United States
TLS Callbacks 6 callback(s) detected.
Debug artifacts chrome_pwa_launcher.exe.pdb
CompanyName The Chromium-Gost Authors
FileDescription Chromium-Gost
FileVersion 146.0.7680.216
InternalName chrome_pwa_launcher
LegalCopyright Copyright 2026 The Chromium-Gost Authors. All rights reserved.
OriginalFilename chrome_pwa_launcher.exe
ProductName Chromium-Gost
ProductVersion 146.0.7680.216
CompanyShortName The Chromium-Gost Authors
ProductShortName Chromium-Gost
LastChange ff9214069a282850ff7ebbef6615bb009cf45c57-refs/branch-heads/7680@{#4013}
Official Build 1

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • blink.net
  • https://perfetto.dev
  • openssl.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Suspicious The PE is possibly packed. Unusual section name found: .fptable
Unusual section name found: LZMADEC
Unusual section name found: malloc_h
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExA
  • LoadLibraryExW
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegCloseKey
  • RegCreateKeyExW
  • RegOpenKeyExW
  • RegQueryValueExW
  • RegSetValueExW
Possibly launches other programs:
  • CreateProcessAsUserW
  • CreateProcessW
Uses Windows's Native API:
  • NtClose
  • NtOpenKeyEx
  • NtQueryValueKey
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Enumerates local disk drives:
  • GetDriveTypeW
Info The PE is digitally signed. Signer: CRYPTO-PRO LLC
Issuer: GlobalSign GCC R45 EV CodeSigning CA 2020
Safe VirusTotal score: 0/71 (Scanned on 2026-05-13 07:16:14) All the AVs think this file is safe.

Hashes

MD5 bb9c9c93e45f3309e03179e7558e7b16
SHA1 d1a4f6e75232f8f72151c93d2eb89a90aa3ddeba
SHA256 28d81d42fedfec3342bc636fb17b6488a78af5656be3243a4779176122963a82
SHA3 98e3692cba18923677d25ad78c971d7b1818d95fcf41c0a1520ae573ba6fa124
SSDeep 49152:+WvzKAS5Brx2J9vWDKkTuYcIB24N6Kzb0:+ylhJCTUfwn0
Imports Hash d1d68f57dfb64d72487853539032fc9c

DOS Header

e_magic MZ
e_cblp 0x78
e_cp 0x1
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0
e_ss 0
e_sp 0
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x78

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 11
TimeDateStamp 2026-Apr-27 19:53:40
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x1c2800
SizeOfInitializedData 0x9b800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000001123B0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion A.0
ImageVersion 0.0
SubsystemVersion A.0
Win32VersionValue 0
SizeOfImage 0x289000
SizeOfHeaders 0x400
Checksum 0x266399
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 3926dc76154ce6145e13a08eec39523f
SHA1 cba0575b3c2bc1fe88251a4ad91b65e39443d7e2
SHA256 d7013afa54b835978fe185ff5365ebebaa7a4a7bb602c24c825e555d4671f45d
SHA3 256494f59154f3c465ab3304657724e5e8e991fabf0ae40107c578038669ba0b
VirtualSize 0x1c26a6
VirtualAddress 0x1000
SizeOfRawData 0x1c2800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.4943

.rdata

MD5 efda8edc123216e4c5603fab5013b555
SHA1 7471cbcb1a7ef6670d590bbfa20a0dcf6f2fa54c
SHA256 a9360d1edfa92099b16a6997ed276f7ad5082b84a3c5a4bc99e7b86664f80d4d
SHA3 88801899beb3328d10eb505db5efb1661f44533df0dbb9a39ab65cd98a09b235
VirtualSize 0x36bac
VirtualAddress 0x1c4000
SizeOfRawData 0x36c00
PointerToRawData 0x1c2c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.52534

.data

MD5 20ca0dbd590b7b711f0e2311d5b5243e
SHA1 e8babb14a0fae93d2201fade55b6902c2b78bb80
SHA256 9a2707a42249b0965b4210b14e2faf0cbf56f38212a13d359af607cc1484abd4
SHA3 c333b628689c176841fda41ff944c2b0c498bacfbde441ffe7c0c7efc87e77c7
VirtualSize 0x32b60
VirtualAddress 0x1fb000
SizeOfRawData 0x11800
PointerToRawData 0x1f9800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.30477

.pdata

MD5 803f9194df09f6538d9e2e69810c0bd6
SHA1 a0641f0f28de9c36d755c17149375a6e7adfdb2d
SHA256 1b2ab71aa72040ba8dff87d927ec50b322f663f3a861845420a5c0cc02b382fc
SHA3 11634857a94e7a125c4fae4a92d5fd3b7d15aa7f7f372d8e0a7e23eb1b0987e5
VirtualSize 0xe04c
VirtualAddress 0x22e000
SizeOfRawData 0xe200
PointerToRawData 0x20b000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.01055

.fptable

MD5 bf619eac0cdf3f68d496ea9344137e8b
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560
SHA3 622de1e1568ddef36c4b89b706b05201c13481c3575d0fc804ff8224787fcb59
VirtualSize 0x100
VirtualAddress 0x23d000
SizeOfRawData 0x200
PointerToRawData 0x219200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.tls

MD5 b94bdc9dc344ee6251c572b2118a94eb
SHA1 61a78585b832f41329ab2de7f5b41b3d83ede56a
SHA256 dd6a0b8854472946024ed6cdc7603d9c40c22378eb521a2e720823258f66329f
SHA3 ffc908e546be6587ec446d7b118a657f6b5d0dd33fe0ee7735a711e214b72541
VirtualSize 0x251
VirtualAddress 0x23e000
SizeOfRawData 0x400
PointerToRawData 0x219400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.162423

LZMADEC

MD5 05e9eab8428a551a281ab278073669fa
SHA1 f0bfa89d3c11280e4ac954b1722650534a7738ba
SHA256 caf8ae633e0f04bd3d5bd49c4b30a5ab0bde47e1d3b1a3540d65dea6223c9329
SHA3 f19ad9e072a343bb8f0475b303385d46768c1386ffc78fef302b1bd9aebda716
VirtualSize 0x11f1
VirtualAddress 0x23f000
SizeOfRawData 0x1200
PointerToRawData 0x219800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.06198

_RDATA

MD5 82f3b2017e7a67885ff532e41e57aea3
SHA1 dde79072659bcf01806e70f9b17e18f31138ef2a
SHA256 7f70d2b88c8950131454a504367c19693554a12ea124bd7a2e2157ad3580c1d0
SHA3 845dbfb431d6afa1172afb45bba05abbf3db24573661ce720f6f3731f90d173b
VirtualSize 0x1f4
VirtualAddress 0x241000
SizeOfRawData 0x200
PointerToRawData 0x21aa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.17751

malloc_h

MD5 24a7e021cbdf2d9d4c8d1176c4ff7db1
SHA1 af308925face948d5bfadde575712cd935f8b88b
SHA256 0ec7b695d1e51573d54cc911b26a4478983d8cd576d76617300f86a407c95199
SHA3 ab43b12a5a89b4ee928ef65ac94e24efddd16b6800107a4110d013bf8b77a597
VirtualSize 0x10d
VirtualAddress 0x242000
SizeOfRawData 0x200
PointerToRawData 0x21ac00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 4.01982

.rsrc

MD5 f547c49e9fa079972d2ba84f4ab666b5
SHA1 4b9010a24949fcee5a9601f2f12a78586a26d621
SHA256 51b366e5572d9934a9d8e8c5e7f33632e04476568cd1c3ffcd4fbe777b63c09e
SHA3 4c3e7dde476798c1078ce7effacc7aa1cdf4423d7e3cc87e2a4e190665bed76c
VirtualSize 0x42700
VirtualAddress 0x243000
SizeOfRawData 0x42800
PointerToRawData 0x21ae00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.99935

.reloc

MD5 303d0ff07f1ab0303bfcee04602b93c9
SHA1 a0c66be2f80584a2e74b2425f8aeb6a870243d18
SHA256 d075ec0c3f4241c0c00f66d7d43bbfe6396e0e88a6c59592f64d6bc5054cce6a
SHA3 7b27fd0059280a62ac3d9e1f0ea3571f9bbd269cf75534a04b036f4c18faafe2
VirtualSize 0x204c
VirtualAddress 0x286000
SizeOfRawData 0x2200
PointerToRawData 0x25d600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.36845

Imports

ADVAPI32.dll CreateProcessAsUserW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
dbghelp.dll SymCleanup
SymFromAddr
SymGetLineFromAddr64
SymGetModuleInfo64
SymGetSearchPathW
SymInitialize
SymSetOptions
SymSetSearchPathW
KERNEL32.dll AcquireSRWLockExclusive
AssignProcessToJobObject
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateIoCompletionPort
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DeleteProcThreadAttributeList
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoW
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNativeSystemInfo
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessId
GetProductInfo
GetQueuedCompletionStatus
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadId
GetThreadPriority
GetThreadPriorityBoost
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetWindowsDirectoryW
GlobalMemoryStatusEx
InitOnceExecuteOnce
InitializeConditionVariable
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeProcThreadAttributeList
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
K32GetModuleInformation
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalFree
MultiByteToWideChar
OutputDebugStringA
PostQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
QueryThreadCycleTime
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
ResetEvent
ResumeThread
RtlCaptureContext
RtlCaptureStackBackTrace
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetHandleInformation
SetInformationJobObject
SetLastError
SetStdHandle
SetThreadInformation
SetThreadPriority
SetThreadPriorityBoost
SetUnhandledExceptionFilter
Sleep
SleepConditionVariableSRW
SuspendThread
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
UnregisterWaitEx
UpdateProcThreadAttribute
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
WINMM.dll timeBeginPeriod
timeEndPeriod
timeGetTime
USERENV.dll CreateEnvironmentBlock
DestroyEnvironmentBlock
USER32.dll AllowSetForegroundWindow
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageW
GetActiveWindow
GetQueueStatus
KillTimer
MsgWaitForMultipleObjectsEx
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
SetTimer
TranslateMessage
UnregisterClassW
SHELL32.dll CommandLineToArgvW
SHGetFolderPathW
SHGetKnownFolderPath
ShellExecuteExW
ole32.dll CoInitializeEx
CoRegisterInitializeSpy
CoRevokeInitializeSpy
CoTaskMemFree
CoUninitialize
ntdll.dll NtClose
NtOpenKeyEx
NtQueryValueKey
RtlFormatCurrentUserKeyPath
RtlFreeUnicodeString
RtlInitUnicodeString
api-ms-win-core-winrt-l1-1-0.dll RoInitialize
RoUninitialize

Delayed Imports

GetHandleVerifier

Ordinal 1
Address 0x64070

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42108
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.98524
MD5 ee1cb8a6630ca1a192dc59bbb02e4a57
SHA1 b239cf475c9b36a537852d3f95e7894dca80f293
SHA256 7d17fb01d04b950d2fcf8cded5d53b6e2092f4f0b728979754b755fdc699aed8
SHA3 b03384f811790aa095e2f444d43c96ad8e64700a1f940642d3ce2be23682a04c

1 (#2)

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.77095
Detected Filetype Icon file
MD5 6c493adbaf26f027e1d72e3cbb09f61f
SHA1 ba60811370c6529e7daf5fe1a28280bc1e8900e5
SHA256 c4c7969f75b3e1f78fae7e5b7d8f276b9fb5ad50a6ce9b80014818357224b876
SHA3 f32faf460da64ca77d96ae354190ee9e886b802743dae8bd086eab779b186d54

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x4ec
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.58272
MD5 363aad3a930f899fd99f15b9919996e1
SHA1 97764e975debbeb68c6b5ef28adc8bc0abb61746
SHA256 d5fdff84e662949a10167d1aec270f0dfc47f306cbed9d1d74ed1be971952955
SHA3 7fbe8ee1009a65a8f02d1d52e5ec7c45e0c5962e90c1b871df4f2b61f495cd06

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 146.0.7680.216
ProductVersion 146.0.7680.216
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName The Chromium-Gost Authors
FileDescription Chromium-Gost
FileVersion (#2) 146.0.7680.216
InternalName chrome_pwa_launcher
LegalCopyright Copyright 2026 The Chromium-Gost Authors. All rights reserved.
OriginalFilename chrome_pwa_launcher.exe
ProductName Chromium-Gost
ProductVersion (#2) 146.0.7680.216
CompanyShortName The Chromium-Gost Authors
ProductShortName Chromium-Gost
LastChange ff9214069a282850ff7ebbef6615bb009cf45c57-refs/branch-heads/7680@{#4013}
Official Build 1
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Apr-27 19:53:40
Version 0.0
SizeofData 52
AddressOfRawData 0x1ed7e8
PointerToRawData 0x1ec3e8
Referenced File chrome_pwa_launcher.exe.pdb

TLS Callbacks

StartAddressOfRawData 0x14023e000
EndAddressOfRawData 0x14023e250
AddressOfIndex 0x14020c648
AddressOfCallbacks 0x1401ef1f0
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_16BYTES
Callbacks 0x000000014008AEB0
0x0000000140110D10
0x000000014008AB30
0x0000000140110A20
0x000000014002D770
0x0000000140087610

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1401fb040
GuardCFCheckFunctionPointer 5370736944
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

Errors

Leave a comment

No comments yet.