× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 01b0007288f99523404d70dcba0e7b02569f1ba8417aacbcc02245a916f93f40
File name: 47608E33.exe
Detection ratio: 43 / 68
Analysis date: 2019-02-19 20:29:00 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190219
Ad-Aware Trojan.GenericKD.31708003 20190219
ALYac Trojan.GenericKD.31708003 20190219
Arcabit Trojan.Generic.D1E3D363 20190219
Avast Win32:TrojanX-gen [Trj] 20190219
AVG Win32:TrojanX-gen [Trj] 20190219
Avira (no cloud) TR/Crypt.Agent.tiwvc 20190219
BitDefender Trojan.GenericKD.31708003 20190219
Bkav HW32.Packed. 20190219
Comodo Malware@#xfem3y14iq81 20190219
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.86d05c 20190109
Cylance Unsafe 20190219
Emsisoft Trojan.GenericKD.31708003 (B) 20190219
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.GPUV 20190219
F-Secure Trojan.TR/Crypt.Agent.tiwvc 20190219
Fortinet W32/Kryptik.GPUV!tr 20190219
GData Trojan.GenericKD.31708003 20190219
Ikarus Trojan-Banker.Emotet 20190219
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0054801e1 ) 20190219
K7GW Trojan ( 0054801e1 ) 20190219
Kaspersky Trojan.Win32.Agent.qwicmo 20190219
Malwarebytes Trojan.Emotet 20190219
McAfee Emotet-FLY!A2F0A929BEF5 20190219
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190219
Microsoft Trojan:Win32/Emotet 20190219
eScan Trojan.GenericKD.31708003 20190219
Palo Alto Networks (Known Signatures) generic.ml 20190219
Panda Trj/GdSda.A 20190219
Qihoo-360 HEUR/QVM20.1.508F.Malware.Gen 20190219
Rising Trojan.Kryptik!8.8 (CLOUD) 20190219
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/EncPk-AOI 20190219
Symantec Trojan.Gen.2 20190219
Trapmine malicious.moderate.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.THBAIAI 20190219
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THBAIAI 20190219
VBA32 BScope.Malware-Cryptor.Emotet 20190219
ViRobot Trojan.Win32.Z.Emotet.135168.JJ 20190219
Webroot W32.Trojan.Emotet 20190219
ZoneAlarm by Check Point Trojan.Win32.Agent.qwicmo 20190219
AegisLab 20190219
AhnLab-V3 20190219
Alibaba 20180921
Antiy-AVL 20190219
Avast-Mobile 20190219
Babable 20180918
Baidu 20190215
CAT-QuickHeal 20190219
ClamAV 20190219
CMC 20190219
Cyren 20190219
DrWeb 20190219
F-Prot 20190219
Jiangmin 20190219
Kingsoft 20190219
MAX 20190219
NANO-Antivirus 20190219
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190207
TACHYON 20190219
Tencent 20190219
TheHacker 20190217
TotalDefense 20190219
Trustlook 20190219
Yandex 20190219
Zillya 20190219
Zoner 20190219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright© 1991-2001 LEAD Technologies, Inc.

Product LEADTOOLS(r) DLL for Win32
Original name LFMSP13N.DLL
Internal name LFMSP13N
File version 13.0.0.047
Description LEADTOOLS(r) DLL for Win32
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-13 20:26:08
Entry Point 0x000025E8
Number of sections 5
PE sections
PE imports
SetTextJustification
SetPixelV
GetCurrentProcess
GetLargePageMinimum
GetProcessHandleCount
WritePrivateProfileStructA
GetCommandLineW
SetConsoleHistoryInfo
GetCommProperties
CancelWaitableTimer
CloseHandle
GetCurrentActCtx
GetVersion
SysFreeString
VarCyCmp
VarCyFromR8
Ord(29)
UserHandleGrantAccess
GetClientRect
GetKeyboardType
GetMenuInfo
CreateIconIndirect
memset
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
12288

SubsystemVersion
6.1

LinkerVersion
4.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
13.0.0.47

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
LEADTOOLS(r) DLL for Win32

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
0

EntryPoint
0x25e8

OriginalFileName
LFMSP13N.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright 1991-2001 LEAD Technologies, Inc.

FileVersion
13.0.0.047

TimeStamp
1995:11:13 12:26:08-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
LFMSP13N

ProductVersion
13.0.0.047

UninitializedDataSize
131072

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
LEAD Technologies, Inc.

LegalTrademarks
LEADTOOLS(r) is a trademark of LEAD Technologies, Inc.

ProductName
LEADTOOLS(r) DLL for Win32

ProductVersionNumber
13.0.0.47

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 a2f0a929bef5389420e1ebe611496858
SHA1 cc5961086d05cbad39e34e67c735a4a604afb2b4
SHA256 01b0007288f99523404d70dcba0e7b02569f1ba8417aacbcc02245a916f93f40
ssdeep
3072:+/puXclWuiADRtVYHPJPL0uT7nJeupXaIpV:+RnRziJz3TTJeI

authentihash be8b7d9fb249c6ca2f302e83db4fc2e433e9cac1da088155ad8328c5e0eef620
imphash c2636d6669af9a4bfa3d8118961b82aa
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-18 17:22:26 UTC ( 2 months ago )
Last submission 2019-02-18 17:56:43 UTC ( 2 months ago )
File names LFMSP13N
wordpadsubs.exe
LFMSP13N.DLL
47608E33.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!