Extracting files from ChromeStandaloneSetup.exe

Questions or comments on the switchless installers? Want to create a new one? Talk about it here.
Post Reply
User avatar
vmanda
Posts: 1634
Joined: Wed Apr 18, 2007 12:25 pm
Location: TM.Romania

Extracting files from ChromeStandaloneSetup.exe

Post by vmanda » Sun Mar 16, 2014 10:24 am

Anybody knows how to extract files/chrome.7z from ChromeStandaloneSetup.exe ?
(without to launch install then capture files!?)

I have tried almost everyting that i know, but just one 102~ file is all that I get.
Last edited by vmanda on Sun Mar 16, 2014 10:58 am, edited 1 time in total.

User avatar
ricktendo64
Posts: 3213
Joined: Mon May 22, 2006 12:27 am
Location: Honduras

Post by ricktendo64 » Sun Mar 16, 2014 10:40 am

Same here, difficult to tell what type of file it is

User avatar
vmanda
Posts: 1634
Joined: Wed Apr 18, 2007 12:25 pm
Location: TM.Romania

Post by vmanda » Sun Mar 16, 2014 11:00 am

USSF says just: "Nothing found [Overlay]"

User avatar
vmanda
Posts: 1634
Joined: Wed Apr 18, 2007 12:25 pm
Location: TM.Romania

Post by vmanda » Sun Mar 16, 2014 11:15 am

It seems that blocking execution of GoogleUpdate.exe nothing happens,
no file extracted, no temp files
and ChromeStandaloneSetup.exe process quick exit.

User avatar
ricktendo64
Posts: 3213
Joined: Mon May 22, 2006 12:27 am
Location: Honduras

Post by ricktendo64 » Sun Mar 16, 2014 11:53 am

There is a 'B' folder if you open it with Restorator, extract that as RAW and you will get a 7zip named 102.raw, extract this and you will get another 102 file

I opened this file in a hex editor but cannot determine what it type it is

baz44
Posts: 11
Joined: Tue Sep 17, 2013 1:39 pm
Location: UK

Post by baz44 » Sun Mar 16, 2014 5:10 pm

No idea what the 102~ is either but the chrome.7z can be picked out using sandboxie.

C:\Sandbox\xxx\DefaultBox\drive\C\Program Files (x86)\GUM27C.tmp

It's inside the 33.0.1750.154_chrome_installer.exe.{8A69D345-D564-463c-AFF1-A69D9E530F96}

<edit> doh, ignore me I didn't read the thread properly :oops:

Post Reply