File: 44ba4e98d610ce77066e9e10412d19ad

Metadata
File name:N/A
File type:PE32 executable (console) Intel 80386, for MS Windows
File size:494334
Analysis date:N/A
MD5:44ba4e98d610ce77066e9e10412d19ad
SHA1:45996ff6c59b6d227e70ffa0bb5551b4cd91a5d6
SHA256:cb152060aba8af80f14e0ec32cbcc9c1cfdcbf65be6cc924cb051c5379e05228
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal Nameimjpuexc.exe
Legal TrademarksMicrosoft(R) is a registered trademark of Microsoft Corporation. Windows(R) is a registered trademark of Microsoft Corporation.
File Size483 kB
Machine TypeIntel 386 or later, and compatibles
File OSWin32
Code Size270848
OS Version5.1
Entry Point0x4f000
File Flags Mask0x003f
Linker Version9.0
File SubtypeN/A
Uninitialized Data SizeN/A
File Version14.0.4734.1000
Initialized Data Size39424
File DescriptionMicrosoft Office IME 2010
Product Version Number14.0.4734.1000
Product NameMicrosoft Office IME 2010
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetUnicode
Language CodeNeutral
File Version Number14.0.4734.1000
File TypeWin32 EXE
Original Filenameimjpuexc.exe
Legal Copyright© 2010 Microsoft Corporation..All rights reserved.
SubsystemWindows command line
Object File TypeDynamic link library
Image Version0.0
File FlagsPre-release, Private build
Subsystem Version5.1
Product Version14.0.4734.1000
Source:
APTNotes
Cyber threat intelligence reports associated with 44ba4e98d610ce77066e9e10412d19ad.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 44ba4e98d610ce77066e9e10412d19ad.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.