Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Advantages and disadvantages  





2 List of executable packers  



2.1  CP/M and MSX-DOS executable  





2.2  MS-DOS executable  





2.3  OS/2 executable  





2.4  New Executable  





2.5  Portable Executable  





2.6  ELF files  





2.7  CLI assembly files  





2.8  Mac OS Classic applications  





2.9  Mach-O (Apple Mac OS X) files  





2.10  Commodore 64 and VIC-20  





2.11  Amiga  





2.12  Java  





2.13  JavaScript  



2.13.1  Self-decompressing compressors  





2.13.2  Redundancy reducing compressors  









3 See also  





4 References  














Executable compression






Deutsch
Español

Italiano

Русский

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 

(Redirected from Executable packer)

Executable compression is any means of compressinganexecutable file and combining the compressed data with decompression code into a single executable. When this compressed executable is executed, the decompression code recreates the original code from the compressed code before executing it. In most cases this happens transparently so the compressed executable can be used in exactly the same way as the original. Executable compressors are often referred to as executable packers, runtime packers, software packers, software protectors, or even "polymorphic packers" and "obfuscating tools".

A compressed executable can be considered a self-extracting archive, where a compressed executable is packaged along with the relevant decompression code in an executable file. Some compressed executables can be decompressed to reconstruct the original program file without being directly executed. Two programs that can be used to do this are CUP386 and UNP.[citation needed]

Most compressed executables decompress the original code in memory and most require slightly more memory to run (because they need to store the decompressor code, the compressed data and the decompressed code). Moreover, some compressed executables have additional requirements, such as those that write the decompressed executable to the file system before executing it.

Executable compression is not limited to binary executables, but can also be applied to scripts, such as JavaScript. Because most scripting languages are designed to work on human-readable code, which has a high redundancy, compression can be very effective and as simple as replacing long names used to identify variables and functions with shorter versions and/or removing white-space.

Advantages and disadvantages[edit]

Software distributors use executable compression for a variety of reasons, primarily to reduce the secondary storage requirements of their software; as executable compressors are specifically designed to compress executable code, they often achieve better compression ratio than standard data compression facilities such as gzip, ziporbzip2 [citation needed]. This allows software distributors to stay within the constraints of their chosen distribution media (such as CD-ROM, DVD-ROM, or floppy disk), or to reduce the time and bandwidth customers require to access software distributed via the Internet.

Executable compression is also frequently used to deter reverse engineering or to obfuscate the contents of the executable (for example, to hide the presence of malware from antivirus scanners) by proprietary methods of compression and/or added encryption. Executable compression can be used to prevent direct disassembly, mask string literals and modify signatures. Although this does not eliminate the chance of reverse engineering, it can make the process more costly.

A compressed executable requires less storage space in the file system, thus less time to transfer data from the file system into memory. On the other hand, it requires some time to decompress the data before execution begins. However, the speed of various storage media has not kept up with average processor speeds, so the storage is very often the bottleneck. Thus the compressed executable will load faster on most common systems. On modern desktop computers, this is rarely noticeable unless the executable is unusually big, so loading speed is not a primary reason for or against compressing an executable.

On operating systems which page executable images on demand from the disk, compressed executables make this process less efficient. The decompressor stub allocates a block of memory to hold the decompressed data, which stays allocated as long as the executable stays loaded, whether it is used or not, competing for memory resources with other applications all along. If the operating system uses a swap file, the decompressed data has to be written to it to free up the memory instead of simply discarding unused data blocks and reloading them from the executable image if needed again. This is usually not noticeable, but it becomes a problem when an executable is loaded more than once at the same time—the operating system cannot reuse data blocks it has already loaded, the data has to be decompressed into a new memory block, and will be swapped out independently if not used. The additional storage and time requirements mean that it has to be weighed carefully whether to compress executables which are typically run more than once at the same time.

Another disadvantage is that some utilities can no longer identify run-time library dependencies, as only the statically linked extractor stub is visible.

Also, some older virus scanners simply report all compressed executables as viruses because the decompressor stubs share some characteristics with those. Most modern virus scanners can unpack several different executable compression layers to check the actual executable inside, but some popular anti-virus and anti-malware scanners have had troubles with false positive alarms on compressed executables. In an attempt to solve the problem of malware obfuscated with the help of runtime packers the IEEE Industry Connections Security Group has introduced a software taggant system.

Executable compression used to be more popular when computers were limited to the storage capacity of floppy disks, which were both slow and low capacity media, and small hard drives; it allowed the computer to store more software in the same amount of space, without the inconvenience of having to manually unpack an archive file every time the user wanted to use the software. However, executable compression has become less popular because of increased storage capacity on computers. It has its use in the demoscene where demos have to stay within a size limit, e.g. 64k intro. Only very sophisticated compression formats, which add to load time, keep an executable small enough to enter these competitions.

List of executable packers[edit]

CP/M and MSX-DOS executable[edit]

Known executable compressors for CP/M-80 / MSX-DOS .COM files:

MS-DOS executable[edit]

Known executable compressors for MS-DOS-compatible executable files (.COMor.EXE):

OS/2 executable[edit]

Known executable compressors under OS/2:

New Executable[edit]

Known executable compressors for New Executables:

Portable Executable[edit]

Known executable compressors for Portable Executables:

Note: Clients in purple are no longer in development.

Name Latest stable Software license x86-64 support
32Lite
Alienyze 1.4 (17 August 2020 (2020-08-17)) Proprietary No
ANDpakk2
Armadillo 9.62 (7 June 2013 (2013-06-07)) Proprietary Yes
ASPack 2.40 (7 December 2018 (2018-12-07)) Proprietary Yes
ASPR (ASProtect) 2.78 (7 December 2018 (2018-12-07)) Proprietary Yes
BeRoEXEPacker
BIN-crypter
BoxedApp Packer 3.3 (26 July 2015 (2015-07-26)) Proprietary Yes
CExe 1.0b (20 July 2001 (2001-07-20)) GPL No
Crinkler 2.3 (22 July 2020 (2020-07-22)) Zlib Yes
dotBundle 1.3 (4 April 2013 (2013-04-04))[15] Proprietary Yes
Enigma Protector 6.60 (21 August 2019 (2019-08-21))[16] Proprietary Yes
Enigma Virtual Box 9.40 (10 October 2019 (2019-10-10))[16] Proprietary Yes
exe32pack
EXE Bundle 3.11 (7 January 2011 (2011-01-07))[17] Proprietary ?
EXECryptor
EXE Stealth 4.14 (29 June 2011 (2011-06-29))[17] Proprietary ?
eXPressor 1.8.0.1 (14 January 2010 (2010-01-14)) Proprietary ?
FSG 2.0 (24 May 2004 (2004-05-24))[18] Freeware No
kkrunchy src 0.23a4 (Unknown) Public domain No
MEW 1.1 (Unknown) Freeware No
MPRESS 2.19 (2 January 2012 (2012-01-02)) Freeware Yes
MuCruncher
NeoLite
NsPack
Obsidium 1.6 (11 April 2017 (2017-04-11))[19] Proprietary Yes
PECompact
PEPack
PESpin 1.33 (3 May 2011 (2011-05-03)) Freeware Yes
Petite 2.4 (22 September 2016 (2016-09-22)) Freeware No
PKLite32
RLPack Basic 1.21 (31 October 2008 (2008-10-31)) GPL No
Shrinker32
Smart Packer Pro X 2.0.0.1 (3 June 2019 (2019-06-03)) Proprietary Yes
Themida/WinLicense 3.0 (24 October 2019 (2019-10-24)) Proprietary Yes
Upack
UPX 3.96 (23 January 2020 (2020-01-23)) GPL experimental
VMProtect 3.4 (3 August 2019 (2019-08-03)) Proprietary Yes
WWPack32 1.20 (19 June 2000 (2000-06-19)) No
XComp/XPack 0.98 (18 February 2007 (2007-02-18)) Freeware No
Yoda's Crypte
YZPack

ELF files[edit]

Known executable compressors for ELF files:

CLI assembly files[edit]

Known executable compressors for CLI assembly files:

Mac OS Classic applications[edit]

Executable compressors for Mac OS Classic applications:

Mach-O (Apple Mac OS X) files[edit]

Known executable compressors for Mach-O (Apple Mac OS X) files:

Commodore 64 and VIC-20[edit]

Known executable compressors for executables on the Commodore 64 and VIC-20:

Amiga[edit]

Known executable compressors for executables on the Amiga series:

Java[edit]

Known executable compressors for Java:

JAR files:

WAR files:

JavaScript[edit]

There are two types of compression that can be applied to JavaScript scripts:

Self-decompressing compressors[edit]

These compress the original script and output a new script that has a decompressor and compressed data.

Redundancy reducing compressors[edit]

These remove white space, remove comments, and shorten variable and function names but do not alter the behavior of the script.

See also[edit]

References[edit]

  1. ^ Gielen, Pierre; Taylor, Johnathan (1997) [1993]. Logan, Wolverine (ed.). "PMarc help manual". Archived from the original on 2019-04-22. Retrieved 2019-02-22. […] PMEXE.CPM […] is a module […] in combination with PMARC […] used to make executable compressed COM files (just like LZEXE or PKLITE […] type: PMARC <archive>.COM=PMEXE2.CPM <filename> [options] The archive-name must be .COM […] not .PMA. The output file will have the extension .CPM. It's an MSX-DOS COM file […] rename file […] to run it […]
  • ^ "Expert Report of Robert B. K. Dewar In Response To The Report Of Kenneth D. Crews". Cambridge University Press et al v. Patton et al, Filing 124, Supplemental Initial Disclosures by Cambridge University Press, Oxford University Press, Inc., Sage Publications, Inc. - Cambridge University Press, Oxfort University Press, Inc., and Sage Publications, Inc. v. Mark P. Becker, Georgia State University President, et al, Civil Action No. 1:08-CV-1425-ODE (Court document). United States District Court For The Northern District Of Georgia, Atlanta Division. p. 18. Exhibit A. Archived from the original on 2018-05-01. Retrieved 2019-04-23. […] SPACEMAKER and TERMULATOR, commodity software for IBM PC (PC DOS file compression utility and VT-100 emulator), being marketed by Realia, Inc. R.B.K. Dewar (1982–1983), 8088 assembly language, 8,000 lines […]
  • ^ Realia, Inc. (January 1983). "If you use DOS, you need this program". PC Magazine (advertisement). 2 (9). Ziff-Davis Publishing: 417. Archived from the original on 2019-04-22. Retrieved 2019-04-22.
  • ^ a b Dewar, Robert Berriedale Keith (1984-03-13). "DOS 3.1 ASMB (Another Silly Microsoft Bug)". info-ibmpc@USC-ISIB.ARPA. Archived from the original on 2018-05-01. Retrieved 2019-04-23. […] The /E option of the linker should generate an EXE file which is logically equivalent to the uncompressed EXE file. The current version […] results in AX being clobbered. AX on entry to an EXE file has a definite meaning (it indicates drive validity for the parameters), thus it should be passed through to the uncompressed image. Given this one very obvious violation of the interface rules, there may be others, I have not bothered to investigate further […] I did write the Realia SpaceMaker program which does a similar sort of thing to the EXEPACK option (but needless to say does not have this particular […]
  • ^ a b Paul, Matthias R. (2002-10-07) [2000]. "Re: masm .com (PSP) related trouble". Newsgroupalt.lang.asm. Archived from the original on 2017-09-03. Retrieved 2017-09-03.}
  • ^ Necasek, Michal (2018-04-30). "Realia SpaceMaker". OS/2 Museum. Archived from the original on 2019-01-27. Retrieved 2019-02-22.
  • ^ Parsons, Jeff (2019-01-10). "An Update on Early Norton Utilities". PCjs. Archived from the original on 2019-01-29. Retrieved 2019-02-22.
  • ^ Necasek, Michal (2019-01-12). "Yep, Norton Did It". OS/2 Museum. Archived from the original on 2019-04-22. Retrieved 2019-04-22.
  • ^ a b Necasek, Michal (2018-03-23). "EXEPACK and the A20-Gate". OS/2 Museum. Archived from the original on 2018-11-13. Retrieved 2019-04-20.
  • ^ Miles, Ya'akov; Nather, Ed (1986-05-17) [1986-02-05, 1986-02-09]. "Undocumented Microsoft LINK option: /E". INFO-IBMPC mailing list. Archived from the original on 2018-05-01. Retrieved 2019-04-26. [Miles:] There exists an undocumented […] switch to Microsoft LINK.EXE […], which will cause an automatic compaction during binding. This process will eliminate storage for uninitialized arrays from the .EXE file produced by the linker […] To use this feature, specify the /E option to the command line […] [Nather:] The option does not exist in MS Link versions 3.00 and 3.01 [Miles:] By comparing the sizes of the (packed) files generated from LINK ver 3.02 and the /E option with the size of the .EXE file manually packed with […] EXEPACK, I have come to the conclusion that LINK ver 3.02 option /E generates EXACTLY the same size file as manually running EXEPACK on a regular .EXE file output by LINK […]
  • ^ Bellard, Fabrice (2003-02-09). "LZEXE home page". bellard.org. Archived from the original on 2019-03-24. Retrieved 2019-03-18.
  • ^ a b c Salomon, David (2000) [1998]. "Chapter 3.22: EXE Compressors". Data Compression: The Complete Reference (2 ed.). Springer-Verlag. p. 212. doi:10.1007/978-3-642-86092-8. ISBN 978-3-540-78086-1. S2CID 35889155. Retrieved 2019-04-26.
  • ^ Paul, Matthias R. (2002-04-11). "Re: [fd-dev] ANNOUNCE: CuteMouse 2.0 alpha 1". freedos-dev. Archived from the original on 2020-02-21. Retrieved 2020-02-21. […] > no one packer may pack combos like .SYS+.COM or .SYS+.EXE. […] There are packers for .COM or .EXE and others for .SYS, but I too have not seen a packer which supports both in one. […] possibility to combine a program/TSR and device driver in .EXE files […] and a program/TSR.COM and device driver into a .COM program […] It might also be possible to add another self-made stub to the file, after it has already been compressed […] all the compressed DR-DOS device drivers use a similar technique to let the normal PKLITE .COM decompressor work with .SYS files (meanwhile PKLITE supports a similar feature for .SYS files itself). […] (NB. PKLITE 1.50 (1995) and higher gained the capability to compress device drivers, but not combined COM+SYS drivers.)
  • ^ "Google Code Archive - Long-term storage for Google Code Project Hosting".
  • ^ "DotBundle - Download an evaluation version". Archived from the original on 2013-08-21. Retrieved 2013-05-06.
  • ^ a b "Software Protection, Software Licensing, Software Virtualization".
  • ^ a b "WebtoolMaster Software News".
  • ^ "Archived copy". www.xtreeme.prv.pl. Archived from the original on 2004-05-25. Retrieved 2022-01-15.{{cite web}}: CS1 maint: archived copy as title (link)
  • ^ "Download | Obsidium Software Protection System".
  • ^ "624".
  • ^ DotProtect http://site.yvansoftware.be/dotpacker1_0 Archived 22 January 2011 at the Wayback Machine
  • ^ Kiene, Steve; Mark, Dave (1999). "A Chat With Steve Kiene". MacTech. Vol. 15, no. 4. Retrieved 2017-12-10.
  • ^ "Lossless Data Compression Program: Hybrid LZ77 RLE". www.cs.tut.fi. Archived from the original on 2014-07-30. Retrieved 2022-01-15.
  • ^ web.comhem.se/~u13114991/exo/
  • ^ "ByteBoozer (PC)".
  • ^ a b c "Crunchers to download".
  • ^ "Askeksa/Shrinkler". GitHub. 2021-09-25.
  • ^ "PackFire v1.2k by Neural".

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Executable_compression&oldid=1226783592"

    Category: 
    EXE packers
    Hidden categories: 
    CS1 maint: archived copy as title
    Webarchive template wayback links
    Articles with short description
    Short description is different from Wikidata
    Articles needing additional references from February 2024
    All articles needing additional references
    Use dmy dates from May 2019
    Use list-defined references from December 2021
    All articles with unsourced statements
    Articles with unsourced statements from February 2024
    Articles with unsourced statements from November 2007
     



    This page was last edited on 1 June 2024, at 20:07 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki