File: 4436cae3fe8c21bc99bb91fbc6702571

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:2185572
Analysis date:N/A
MD5:4436cae3fe8c21bc99bb91fbc6702571
SHA1:2f90d55e8f63cba14d569d9767f17f24110a125a
SHA256:6cfc70556a6d835149de52e8f90b4e2b6bb1c6ffd46398e1db0c264fe7d0fe55
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal NamePOWERPNT
File Size2.1 MB
Machine TypeIntel 386 or later, and compatibles
File OSWindows NT 32-bit
Code Size4608
OS Version5.1
Entry Point0x218403
File Flags Mask0x003f
Linker Version9.0
File SubtypeN/A
Uninitialized Data SizeN/A
File Version14.0.4734.1000
Initialized Data Size2150912
File DescriptionMicrosoft PowerPoint
Product Version Number14.0.4734.0
Product NameMicrosoft Office 2010
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetWindows, Latin1
Language CodeNeutral
File Version Number14.0.4734.1000
File TypeWin32 EXE
Original FilenamePOWERPNT.EXE
Legal Copyright© 2010 Microsoft Corporation. All rights reserved.
Legal Trademarks 2Windows® is a registered trademark of Microsoft Corporation.
Legal Trademarks 1Microsoft® is a registered trademark of Microsoft Corporation.
SubsystemWindows GUI
Object File TypeExecutable application
Image Version0.0
File Flags(none)
Subsystem Version5.1
Product Version14.0.4734.1000
Source:
APTNotes
Cyber threat intelligence reports associated with 4436cae3fe8c21bc99bb91fbc6702571.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 4436cae3fe8c21bc99bb91fbc6702571.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.