× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cac0cbe663b4820efaaf7962b746be567414353acd1ae46a90954a94663b32a
File name: chrome.dll
Detection ratio: 0 / 56
Analysis date: 2016-06-04 09:04:46 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware 20160604
AegisLab 20160604
AhnLab-V3 20160603
Alibaba 20160603
ALYac 20160604
Antiy-AVL 20160604
Arcabit 20160604
Avast 20160604
AVG 20160604
Avira (no cloud) 20160603
AVware 20160604
Baidu 20160603
Baidu-International 20160604
BitDefender 20160604
Bkav 20160603
CAT-QuickHeal 20160604
ClamAV 20160604
CMC 20160602
Comodo 20160604
Cyren 20160604
DrWeb 20160604
Emsisoft 20160604
ESET-NOD32 20160604
F-Prot 20160604
F-Secure 20160604
Fortinet 20160604
GData 20160604
Ikarus 20160604
Jiangmin 20160604
K7AntiVirus 20160604
K7GW 20160604
Kaspersky 20160604
Kingsoft 20160604
Malwarebytes 20160604
McAfee 20160604
McAfee-GW-Edition 20160604
Microsoft 20160604
eScan 20160604
NANO-Antivirus 20160604
nProtect 20160603
Panda 20160604
Qihoo-360 20160604
Rising 20160604
Sophos AV 20160604
SUPERAntiSpyware 20160604
Symantec 20160604
Tencent 20160604
TheHacker 20160604
TrendMicro 20160604
TrendMicro-HouseCall 20160604
VBA32 20160603
VIPRE 20160604
ViRobot 20160604
Yandex 20160603
Zillya 20160603
Zoner 20160604
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 2012 Google Inc. All rights reserved.

Product Google Chrome
Original name chrome.dll
Internal name chrome_dll
File version 27.0.1453.116
Description Google Chrome
Signature verification Signed file, verified signature
Signing date 2:27 AM 6/15/2013
Signers
[+] Google Inc
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 11/14/2011
Valid to 12:59 AM 11/14/2014
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 06C92BEC3BBF32068CB9208563D004169448EE21
Serial number 09 E2 8B 26 DB 59 3E C4 E7 32 86 B6 64 99 C3 70
[+] VeriSign Class 3 Code Signing 2010 CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 9/30/2010
Valid to 12:59 AM 1/2/2014
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 14FCF0BB187D563B568EEA5FC888A53D288698D6
Serial number 4D 62 90 E5 8C 54 F0 F1 EB 17 34 1A 13 10 E6 A4
[+] VeriSign Class 3 Public Primary CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 1/29/1996
Valid to 12:59 AM 8/2/2028
Valid usage Email Protection, Client Auth, Code Signing, Server Auth
Algorithm md2RSA
Thumbprint 742C3192E607E424EB4549542BE1BBC53E6174E2
Serial number 70 BA E4 1D 10 D9 29 34 B6 38 CA 7B 03 CC BA BF
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-06-14 22:42:11
Entry Point 0x000010D9
Number of sections 9
PE sections
Overlays
MD5 99bf8ffa800e7000a179113e85c5d81f
File type data
Offset 45596672
Size 6096
Entropy 7.30
PE imports
CryptDestroyKey
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
RegDeleteKeyW
TraceEvent
ConvertSidToStringSidW
RegQueryValueExA
CryptSetHashParam
RegNotifyChangeKeyValue
CryptHashData
RegisterTraceGuidsW
RegQueryValueExW
CryptImportKey
CryptCreateHash
SetSecurityDescriptorDacl
GetSidSubAuthorityCount
GetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
GetUserNameW
RegOpenKeyExW
SetFileSecurityW
LookupAccountNameW
OpenEventLogW
RegEnumValueA
CryptGenKey
GetTokenInformation
CryptReleaseContext
CloseEventLog
UnregisterTraceGuids
RegQueryInfoKeyW
RegEnumKeyExW
GetTraceEnableLevel
CryptAcquireContextW
GetSecurityDescriptorSacl
GetSidSubAuthority
GetTraceEnableFlags
CryptGetKeyParam
CryptContextAddRef
SetSecurityInfo
CryptDestroyHash
CryptGetUserKey
RegEnumValueW
RegSetValueExW
CryptSignHashW
RegDeleteValueW
CryptGetHashParam
CryptExportKey
InitializeSecurityDescriptor
ConvertSecurityDescriptorToStringSecurityDescriptorW
CreateProcessAsUserW
ReadEventLogW
RegOpenKeyExA
GetTraceLoggerHandle
InitCommonControlsEx
SetDIBits
PlayEnhMetaFileRecord
GetCharABCWidthsW
GetTextMetricsW
SetMapMode
GetEnhMetaFileBits
SetICMMode
CombineRgn
GetTextExtentPointI
SetWorldTransform
GetRegionData
GetTextFaceW
EqualRgn
AddFontMemResourceEx
SetPixelFormat
SetTextAlign
StretchBlt
StretchDIBits
SwapBuffers
GetGlyphIndicesW
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
DeleteEnhMetaFile
PathToRegion
CreateFontIndirectW
SetDCBrushColor
CreateRectRgnIndirect
EndPath
GetEnhMetaFileW
GetBitmapBits
ExcludeClipRect
SetBkMode
EnumFontFamiliesW
RectInRegion
PtInRegion
ChoosePixelFormat
BitBlt
GetICMProfileW
CreateEnhMetaFileW
SetAbortProc
GetFontData
GetOutlineTextMetricsW
GetFontUnicodeRanges
CloseEnhMetaFile
SetROP2
EndPage
EnumEnhMetaFile
CancelDC
GetTextColor
StrokePath
BeginPath
DeleteObject
SetGraphicsMode
PatBlt
CreatePen
SetStretchBltMode
Rectangle
GetDeviceCaps
CreateDCA
LineTo
DeleteDC
EndDoc
GetWorldTransform
GetCharWidthI
StartPage
GetObjectW
CreateDCW
GdiComment
SetEnhMetaFileBits
SetDIBitsToDevice
GetStockObject
PlayEnhMetaFile
GdiFlush
SelectClipRgn
RoundRect
ExtEscape
GetEnhMetaFileHeader
GetTextExtentPoint32W
CreatePolygonRgn
GetGlyphOutlineW
GetRgnBox
SaveDC
RemoveFontMemResourceEx
ExtTextOutW
ModifyWorldTransform
SetDCPenColor
CreateSolidBrush
CreateBitmap
GdiAlphaBlend
SetTextColor
GetCurrentObject
SetMiterLimit
MoveToEx
EnumFontFamiliesExW
CreateDIBSection
AbortPath
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
StrokeAndFillPath
CreateFontW
PolyBezier
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
RestoreDC
GetStretchBltMode
StartDocW
CreateCompatibleBitmap
GetVolumePathNameW
FreeConsole
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
GetComputerNameA
GetFileAttributesA
WaitForSingleObject
LockResource
GetDriveTypeA
EncodePointer
ReplaceFileW
GetFileAttributesW
SystemTimeToTzSpecificLocalTime
GetStdHandle
GetVolumePathNamesForVolumeNameW
DisconnectNamedPipe
HeapReAlloc
OpenFileMappingW
GetConsoleMode
GetDiskFreeSpaceExW
LocalAlloc
FreeEnvironmentStringsW
MapViewOfFileEx
GetVolumeInformationW
SetFilePointer
SetErrorMode
UnhandledExceptionFilter
IsProcessInJob
GetLogicalDrives
GetFileInformationByHandle
SetCommTimeouts
InitializeSListHead
GetThreadContext
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetProcAddress
WaitForDebugEvent
InterlockedPopEntrySList
GetDiskFreeSpaceW
CompareStringW
InterlockedExchange
GetTempPathW
FormatMessageW
GetSystemTimeAsFileTime
GetCommandLineA
GetThreadTimes
GlobalMemoryStatusEx
GetDiskFreeSpaceA
GetStringTypeW
ConnectNamedPipe
GetFullPathNameA
SetEvent
LocalFree
MoveFileA
ResumeThread
RtlUnwind
InterlockedPushEntrySList
GetEnvironmentVariableA
LoadResource
GetLastError
GetLogicalDriveStringsW
FindClose
TlsGetValue
QueryDosDeviceW
MoveFileW
GetFullPathNameW
QueueUserWorkItem
OutputDebugStringA
GetEnvironmentVariableW
SetLastError
SetConsoleTextAttribute
GetUserDefaultUILanguage
GetSystemTime
OpenThread
InitializeCriticalSection
CopyFileW
GetNamedPipeInfo
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
FindNextVolumeW
lstrcmpiW
VerSetConditionMask
SetFileAttributesA
HeapSetInformation
GetVolumeInformationA
InterlockedExchangeAdd
SetThreadPriority
GetUserDefaultLCID
AllocConsole
GlobalAddAtomW
GetCurrentProcess
Module32First
LoadLibraryExW
MultiByteToWideChar
VerifyVersionInfoW
SetFilePointerEx
GetSystemPowerStatus
FlushInstructionCache
GetPrivateProfileStringW
FormatMessageA
GetProcessId
RegisterWaitForSingleObject
GlobalDeleteAtom
LockFileEx
CreateSemaphoreA
CreateThread
SetEnvironmentVariableW
MoveFileExW
TlsSetValue
GetSystemDirectoryW
DeleteCriticalSection
SetNamedPipeHandleState
Module32Next
CreateSemaphoreW
GetConsoleDisplayMode
CreateMutexW
GetVolumeNameForVolumeMountPointW
IsProcessorFeaturePresent
UnlockFile
GetSystemDirectoryA
TzSpecificLocalTimeToSystemTime
SetEnvironmentVariableA
SetPriorityClass
SetThreadContext
GetThreadSelectorEntry
GlobalMemoryStatus
FindCloseChangeNotification
SetUnhandledExceptionFilter
InterlockedDecrement
GetModuleHandleExW
SetCurrentDirectoryW
CreateWaitableTimerW
VirtualQuery
DebugActiveProcess
VirtualQueryEx
GetCommModemStatus
CreateEventW
SetEndOfFile
GetLocaleInfoA
GetCurrentThreadId
InterlockedIncrement
GetModuleHandleExA
GetNumberFormatW
WriteConsoleW
MulDiv
CreateToolhelp32Snapshot
AreFileApisANSI
EscapeCommFunction
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
SetHandleCount
TerminateThread
lstrcmpiA
DeviceIoControl
FindVolumeClose
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
GetUserDefaultLangID
ExitThread
FreeLibrary
GlobalSize
GetProcessIoCounters
GetWindowsDirectoryW
DecodePointer
GetFileSize
WriteProcessMemory
OpenProcess
CreateDirectoryA
DeleteFileA
GetDateFormatW
RtlCaptureStackBackTrace
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
GetNamedPipeHandleStateW
CreateNamedPipeW
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
AssignProcessToJobObject
WriteFile
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
FindFirstFileExA
FindNextFileW
WTSGetActiveConsoleSessionId
ResetEvent
GetTempFileNameA
CreateFileMappingA
FindFirstFileW
IsValidLocale
DuplicateHandle
FindFirstFileExW
GlobalLock
GlobalAlloc
ReadConsoleW
QueryInformationJobObject
SleepEx
GetTimeZoneInformation
Sleep
SetCommState
CreateFileW
GetFileType
ContinueDebugEvent
CreateFileA
ExitProcess
GetCurrencyFormatW
FindFirstVolumeW
LeaveCriticalSection
GetNativeSystemInfo
DefineDosDeviceW
AttachConsole
LCMapStringW
SystemTimeToFileTime
GetComputerNameW
GetShortPathNameW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
OpenEventW
VirtualAllocEx
UnregisterWaitEx
GetTimeFormatW
GetProcessTimes
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
GetOverlappedResult
FindFirstChangeNotificationW
Process32NextW
CreateProcessW
GetQueuedCompletionStatus
GetUserGeoID
Module32FirstW
SwitchToThread
SizeofResource
GetCurrentDirectoryW
RaiseException
CreateIoCompletionPort
SetFileTime
GetCommandLineW
WideCharToMultiByte
CancelIo
HeapSize
SetThreadAffinityMask
GlobalGetAtomNameW
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
SuspendThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
GetCommState
CloseHandle
UnlockFileEx
GetACP
GetModuleHandleW
GetGeoInfoW
SetThreadExecutionState
FileTimeToLocalFileTime
GetFileAttributesExW
EnumSystemLocalesA
GetLongPathNameW
LoadLibraryW
GetLocalTime
IsValidCodePage
HeapCreate
FindResourceW
PostQueuedCompletionStatus
VirtualFree
GetComputerNameExW
TerminateProcess
SetConsoleCtrlHandler
Module32NextW
VirtualAlloc
GetCurrentProcessId
GetOEMCP
AccessibleObjectFromWindow
CreateStdAccessibleObject
LresultFromObject
LoadRegTypeLib
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarUI4FromStr
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetUBound
SafeArrayLock
SafeArrayGetVartype
SafeArrayRedim
SafeArrayUnlock
SafeArrayGetLBound
LoadTypeLib
SysFreeString
VariantInit
QueryWorkingSet
GetMappedFileNameW
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
UuidCreateSequential
UuidToStringW
RpcStringFreeW
UrlCreateFromPathA
SHDeleteKeyW
PathIsUNCA
PathFindFileNameW
SHGetValueA
PathFileExistsW
SHCopyKeyW
SHDeleteEmptyKeyW
PathIsUNCW
PathFindExtensionW
PathGetCharTypeW
UrlCreateFromPathW
SHStrDupW
PathFileExistsA
PathRemoveExtensionW
InitializeSecurityContextA
CompleteAuthToken
AcquireCredentialsHandleA
DeleteSecurityContext
AcquireCredentialsHandleW
FreeContextBuffer
InitializeSecurityContextW
QuerySecurityPackageInfoW
FreeCredentialsHandle
CreateEnvironmentBlock
RegisterGPNotification
DestroyEnvironmentBlock
ScriptPlace
ScriptFreeCache
ScriptStringAnalyse
ScriptStringFree
ScriptLayout
ScriptStringOut
ScriptXtoCP
ScriptGetFontProperties
ScriptShape
ScriptJustify
ScriptItemize
ScriptCPtoX
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeKillEvent
waveOutReset
waveInOpen
timeSetEvent
timeBeginPeriod
timeEndPeriod
waveOutOpen
waveInPrepareHeader
waveOutPause
waveInMessage
waveOutGetNumDevs
waveInGetDevCapsW
waveOutClose
waveInAddBuffer
timeGetTime
waveInClose
timeGetDevCaps
waveOutRestart
waveInGetNumDevs
waveOutUnprepareHeader
waveOutPrepareHeader
waveInUnprepareHeader
waveInStart
waveOutWrite
waveInReset
WTHelperProvDataFromStateData
WinVerifyTrust
WTSQuerySessionInformationW
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
WTSQueryUserToken
WTSFreeMemory
CoInitializeEx
OleUninitialize
CoUninitialize
CoTaskMemAlloc
RevokeDragDrop
ReleaseStgMedium
CoCreateGuid
CoTaskMemRealloc
CoCreateInstance
RegisterDragDrop
DoDragDrop
GetHGlobalFromStream
CoGetObject
OleDuplicateData
PropVariantClear
CLSIDFromString
CoTaskMemFree
CreateStreamOnHGlobal
StringFromGUID2
CoSetProxyBlanket
OleInitialize
PE exports
Number of PE resources by type
BINDATA 457
RT_ICON 40
RT_GROUP_ICON 26
RT_CURSOR 22
RT_GROUP_CURSOR 20
RT_DIALOG 2
RT_ACCELERATOR 2
CHROME_HTML 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 500
ENGLISH US 72
PE resources
Debug information
ExifTool file metadata
ProductShortName
Chrome

SubsystemVersion
5.1

OfficialBuild
1

InitializedDataSize
14318080

ImageVersion
0.0

ProductName
Google Chrome

FileVersionNumber
27.0.1453.116

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

LinkerVersion
10.0

FileTypeExtension
dll

OriginalFileName
chrome.dll

MIMEType
application/octet-stream

Subsystem
Windows GUI

CompanyShortName
Google

FileVersion
27.0.1453.116

TimeStamp
2013:06:14 23:42:11+01:00

FileType
Win32 DLL

PEType
PE32

InternalName
chrome_dll

ProductVersion
27.0.1453.116

FileDescription
Google Chrome

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright 2012 Google Inc. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Google Inc.

CodeSize
31277568

FileSubtype
0

ProductVersionNumber
27.0.1453.116

LastChange
206485

EntryPoint
0x10d9

ObjectFileType
Executable application

File identification
MD5 27b873a624c65e12a253d865ffd1f685
SHA1 51a21afaaf21f52a80d651cb52f9700308ead043
SHA256 3cac0cbe663b4820efaaf7962b746be567414353acd1ae46a90954a94663b32a
ssdeep
786432:l6zDR6E+s9pf8hhTkBNZkt8EbtTR7dKu2LOI70E6MKaYRxcSP+I8BU:l6zgg8TgZkt8Ebtt7drBI7aJaK6SPKU

authentihash bf9845f1c5573ac973c45cc98426a03172a2b2ac61777bb5c82aab3f213afdd8
imphash 2d4ecc6f8391913a1eded601c2efbd3d
File size 43.5 MB ( 45602768 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Generic Win/DOS Executable (50.0%)
DOS Executable Generic (49.9%)
Tags
pedll signed overlay

VirusTotal metadata
First submission 2013-06-20 03:43:42 UTC ( 5 years, 6 months ago )
Last submission 2016-06-04 09:04:46 UTC ( 2 years, 6 months ago )
File names 00000009
00000001
00000006
chrome_dll
000004c3
00000bc1
000000a2
chrome.dll
00000bff
00000f10
00000053
00000051
chrome.dll
00000112
0000004e
000004b0
chrome.dll
chrome.dll
00000347
000001cd
chrome.dll
00000d74
chrome.dll
00000207
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!