File: 2f18b64c3d60e01c967762b89d188a59

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:816100
Analysis date:N/A
MD5:2f18b64c3d60e01c967762b89d188a59
SHA1:cb5d30625ba5da0e8fa7a9deffb48372e37e9136
SHA256:6d4f5d4809009c82fd43eaae22196c1bf43721e7ba775f25db70f8faa8435a1b
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal Namemstordb
File Size797 kB
Machine TypeIntel 386 or later, and compatibles
File OSWindows NT 32-bit
Code Size596992
OS Version4.0
Entry Point0x9e000
File Flags Mask0x003f
Linker Version7.10
File SubtypeN/A
Uninitialized Data SizeN/A
File Version11.0.8164
Initialized Data Size35840
File DescriptionMedia Catalog Object
Product Version Number11.0.8164.0
Product NameMicrosoft Clip Organizer
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetWindows, Latin1
Language CodeNeutral
File Version Number11.0.8164.0
File TypeWin32 EXE
Original Filenamemstordb.exe
Legal CopyrightCopyright © 1983-2003 Microsoft Corporation. All rights reserved.
Legal Trademarks 2Windows® is a registered trademark of Microsoft Corporation.
Legal Trademarks 1Microsoft® is a registered trademark of Microsoft Corporation.
SubsystemWindows GUI
Object File TypeExecutable application
Image Version0.0
File Flags(none)
Subsystem Version4.0
Product Version11.0.8164
Source:
APTNotes
Cyber threat intelligence reports associated with 2f18b64c3d60e01c967762b89d188a59.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 2f18b64c3d60e01c967762b89d188a59.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.