Information about nw.dll

nw.dll

nw.dll is a Windows file recorded in the ThreatInfo database. It is associated with nwjs. The reported company name is The NW.js Community. The current detection status is Undefined, based on the latest analysis from 2021-08-29 20:38:48 (4 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: nwjs
Company Name: The NW.js Community
MD5: be2f148def1765e2ed557f6579425dd0
Size: 135 MB
First Published: 2021-05-03 20:38:27 (5 years ago)
Latest Published: 2021-08-29 20:38:48 (4 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-08-29 20:38:48 (4 years ago)
%appdata%
%appdata%

ThreatInfo has observed nw.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

50.0%
50.0%

The strongest geographic signal for this file is Romania with 50.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for nw.dll is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

nw.dll is identified as pe for 64 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000180000000
Entry Address: 0x06e94490

PE Sections:

Name Size of data MD5
.text 116258304 2f9f8cd50dbdf41fa3a0b6c976a8ddc9
.rdata 19220992 fe8a4ad072dcda568d55272ec032cafe
.data 387072 d6927320426e6a0598bd3599f0fa0a41
.pdata 4220416 0d545f6ae93f76eb12c2e1e671a8afa0
.00cfg 512 8bf7c051f714a9749f59bcdac7f7836d
.gehcont 512 cedd94e80c827bf4508176f03661ed14
.retplne 512 5aae1404b2d32c92d232eadc8296c323
.rodata 4608 5103ab26d7d806bfe65557abb8889d40
.tls 512 ba1de0d27ef02b55fa771d6d4411cb30
CPADinfo 512 60d3ea61d541c9be2e845d2787fb9574
_RDATA 512 b9b81867834a26a466d741d11b8aa4b6
.rsrc 364544 9fedcd82c12c8345a05ab8d291fc30a7
.reloc 1163264 b1ac8b94cacf06a7c148dd5446b5bb45

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: