File: dfbcd4134339c9efc3fbcc18a16a519a

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:51532
Analysis date:N/A
MD5:dfbcd4134339c9efc3fbcc18a16a519a
SHA1:64649bf3bc4e4afd63e8fa03943211a2395d0345
SHA256:ec1b4ca22935d717e618688307f0e8fa7f6a785aa7e90fff1848215fec4e6d97
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal NameElevation
File Size50 kB
Machine TypeIntel 386 or later, and compatibles
File OSWindows NT 32-bit
Code Size29696
OS Version4.0
Entry Point0xe350
File Flags Mask0x003f
Linker Version8.0
File SubtypeN/A
Uninitialized Data SizeN/A
File Version12.0.4518.1014
Initialized Data Size8192
File DescriptionMicrosoft Office OneNote Privilege Elevation
Product Version Number12.0.4518.0
Product NameMicrosoft Office OneNote
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetWindows, Latin1
Language CodeNeutral
File Version Number12.0.4518.1014
File TypeWin32 EXE
Original FilenameONElevation.exe
Legal Copyright© 2006 Microsoft Corporation. All rights reserved.
Legal Trademarks 2Windows® is a registered trademark of Microsoft Corporation.
Legal Trademarks 1Microsoft® is a registered trademark of Microsoft Corporation.
SubsystemWindows GUI
Object File TypeExecutable application
Image Version0.0
File Flags(none)
Subsystem Version5.1
Product Version12.0.4518.1014
Source:
APTNotes
Cyber threat intelligence reports associated with dfbcd4134339c9efc3fbcc18a16a519a.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about dfbcd4134339c9efc3fbcc18a16a519a.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.