libcef.dll file report

MD5 71cb8d064b1ba7403a8595d081d430fc
Latest seen 2023-02-03 23:59:05 (3 years ago)
First seen 2023-02-03 23:59:00 (3 years ago)
Size 166 MB
Signed by Nvidia Corporation

Why it matters

Evidence available for this file

Detection

Latest status is clean for this hash.

Timeline

First seen 2023-02-03 23:59:00 (3 years ago); latest analysis 2023-02-03 23:59:05 (3 years ago).

Publisher context

Product metadata: Chromium Embedded Framework (CEF) Dynamic Link Library.

Digital signature

Signed by Nvidia Corporation. ThreatInfo marks this publisher as trusted for this record.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Confirm the hash and publisher match the expected software.
  2. Review the observed locations and signature information below.
  3. Rescan if the file was downloaded from an unknown source or appears in an unusual path.

libcef.dll is a Windows file recorded in the ThreatInfo database. It is associated with Chromium Embedded Framework (CEF) Dynamic Link Library. The current detection status is Clean, based on the latest analysis from 2023-02-03 23:59:05 (3 years ago).

This record is currently marked as clean, but file reputation can depend on the exact path, hash, and source. Compare the MD5 and publisher data below with the file on your system.

Product Name: Chromium Embedded Framework (CEF) Dynamic Link Library
MD5: 71cb8d064b1ba7403a8595d081d430fc
Size: 166 MB
First Published: 2023-02-03 23:59:00 (3 years ago)
Latest Published: 2023-02-03 23:59:05 (3 years ago)
Status: Clean (on last analysis)
Analysis Date: 2023-02-03 23:59:05 (3 years ago)
Signed By: Nvidia Corporation
Status: Trusted Publisher

ThreatInfo marks this publisher as trusted for this record, but the file hash and source should still match the expected software distribution.

%localappdata%\nvidia corporation\geforcenowinstallerfiles\geforcenow
%localappdata%\nvidia corporation\geforcenow

ThreatInfo has observed libcef.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Netherlands with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for libcef.dll is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

libcef.dll is identified as pe for 64 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000180000000
Entry Address: 0x088d65c0

PE Sections:

Name Size of data MD5
.text 143906816 0a8df6e3c48b92e510e073833a14c4ee
.rdata 22547456 1a8068c05508d18d69a2ebc3ed8944be
.data 606208 cd20deb7b992d54beb525b3444d70034
.pdata 5466624 7ad937fda7540e227862c6db9cc3b87c
.00cfg 512 988aa3c050d0c93950c7591614e385ea
.gxfg 17408 57d15329a9d9974289994ed6e595ea34
.retplne 512 b3bbd65c84a2444d363cc9b0f471fd7e
.rodata 4608 ab87d2e8f7e7a40ee320b1ce20d19e20
.tls 1024 0e40aaf104e671126dca5b0ce0b20dfa
.voltbl 512 cbc1feb2941630a677f81ec5edd66c85
CPADinfo 512 60d3ea61d541c9be2e845d2787fb9574
_RDATA 512 1dbaded8a67fb60a3aa74fc263b59635
malloc_h 512 f922df7f1612e0e308c3f2232be6c6e2
.rsrc 144896 56ce172741f583e439f9f1d8e402becf
.reloc 1449472 4b506f2bfac46fa29656871c1b824ea7

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: