File: 94ff47f71487903314e3ba9f2b0521c32c4aa0ca99c7df0adca0a25d17eff6f6

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:525312
Analysis date:N/A
MD5:5cf25b6979173d7983505064a9a7b6d0
SHA1:791df9ddc0f4be0ed7337e94141980e8234aa053
SHA256:94ff47f71487903314e3ba9f2b0521c32c4aa0ca99c7df0adca0a25d17eff6f6
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal NameN/A
File Size513 kB
Machine TypeIntel 386 or later, and compatibles
File OSWin32
Code Size114688
OS Version5.0
Entry Point0xf3e5
File Flags Mask0x003f
Linker Version21.0
File SubtypeN/A
Uninitialized Data SizeN/A
File Version3, 3, 1, 362
Initialized Data Size564224
File DescriptionSoftware
Product Version Number3.3.1.362
Product NameWindows XML
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetWindows, Latin1
Language CodeEnglish (U.S.)
File Version Number3.3.1.362
File TypeWin32 EXE
Original FilenameN/A
Legal CopyrightCopyright (c) Microsoft Corporation.  All rights
Legal Trademarks 2is a trademark of Corporation.
Legal Trademarks 1Microsoft® is a trademark of Microsoft Corporation.
SubsystemWindows GUI
Object File TypeExecutable application
Image Version0.0
File Flags(none)
Subsystem Version5.0
Product Version3, 3, 1, 362
Source:
APTNotes
Cyber threat intelligence reports associated with 94ff47f71487903314e3ba9f2b0521c32c4aa0ca99c7df0adca0a25d17eff6f6.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 94ff47f71487903314e3ba9f2b0521c32c4aa0ca99c7df0adca0a25d17eff6f6.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.