Online Virus Checker | v.1.0.182.174 |
DB Version: | 2024-07-15 20:00:25 |
Packing is a common tactic used by malware authors to make their malicious code more difficult to analyze and detect by antivirus and security programs. These techniques involve compressing, encrypting, or otherwise altering the malware's code to make it appear different from its original form. The goal is to hide the true nature of the malware from security tools.
File | Updater.exe |
Checked | 2024-07-15 17:33:30 |
MD5 | 4ab8ccecd4a134b37a1141b515371b66 |
SHA1 | d0ebd671b85d91b7e4405e78dc8de723c23ee99d |
SHA256 | 7059ff79287dcb1ead0d9b0a166bc551d729b1c7c412cecab3574ac1379685f8 |
SHA512 | 249ed30e142530b006958605f9f31f6d9fcf39b412e4ef1b2040887ed7020363749ce89150c4c35a3b4a92a7e6955775dc9f7c0246034fe18909c39bdb121ecd |
Imphash | 5f85c353cf9895ecc2a751010283213a |
File Size | 9689600 bytes |
Gridinsoft has the capability to identify and eliminate Trojan.Win64.Packed.sa without requiring further user intervention.
CompanyName | Google Inc. |
FileTitle | chrome.exe |
FileDescription | Google Chrome |
FileVersion | 70,0,3538,110 |
LegalCopyright | Copyright 2017 Google Inc. All rights reserved. |
LegalTrademark | |
ProductName | Google Chrome |
ProductVersion | 70,0,3538,110 |
Translation | 0x0409 0x04e4 |
3baaa1348a74c805c98ca0c9ccd05c11 3d5004e5f1a3de5b86836ab7f3986200 f0cc9d93928ec8e0 |
|
Image Base: | 0x140000000 |
Entry Point: | 0x14087b511 |
Compilation: | 2024-06-29 13:47:42 |
Checksum: | 0x00000000 (Actual: 0x00946b87) |
OS Version: | 6.0 |
PEiD: | PE32+ executable (GUI) x86-64, for MS Windows |
Sign: | The PE file does not contain a certificate table. |
Sections: | 10 |
Imports: | msvcrt, KERNEL32, WTSAPI32, USER32, |
Exports: | 0 |
Resources: | 3 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00012276 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.rdata | 0x00014000 | 0x00003224 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.data | 0x00018000 | 0x004fdfc8 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.pdata | 0x00516000 | 0x00000198 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.00cfg | 0x00517000 | 0x00000010 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.tls | 0x00518000 | 0x00000010 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.vmp0 | 0x00519000 | 0x003559e4 | 0x00000000 | d41d8cd98f00b204e9800998ecf8427e | 0.00 |
.vmp1 | 0x0086f000 | 0x0092c588 | 0x0092c600 | d4cc77fef0d229cb27e192067596e7da | 7.97 |
.reloc | 0x0119c000 | 0x000000e4 | 0x00000200 | 75ffe5acd12d6097e354066b18130975 | 2.26 |
.rsrc | 0x0119d000 | 0x00010c18 | 0x00010e00 | 9c37a4c754cc1206d5c4dad67ce81970 | 3.52 |