× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5716f84dff360e553b50e1d249d842b918d3799fc9b9e3ebf8d08f9fa674738c
File name: (17).exe
Detection ratio: 22 / 66
Analysis date: 2018-06-02 10:32:13 UTC ( 8 months, 3 weeks ago ) View latest
Antivirus Result Update
Avira (no cloud) HEUR/AGEN.1017395 20180601
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180601
Cylance Unsafe 20180602
DrWeb Trojan.EmotetENT.229 20180602
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/GenKryptik.CBKE 20180602
Fortinet W32/GenKryptik.CALT!tr 20180602
GData Win32.Trojan-Spy.Emotet.QW 20180602
Sophos ML heuristic 20180601
K7AntiVirus Spyware ( 004c76c01 ) 20180602
K7GW Spyware ( 004c76c01 ) 20180602
Kaspersky Trojan-Banker.Win32.Emotet.aqaa 20180602
McAfee Artemis!48D61EEAC1E0 20180602
McAfee-GW-Edition BehavesLike.Win32.Emotet.dh 20180602
Microsoft Trojan:Win32/Cloxer.D!cl 20180602
Panda Trj/GdSda.A 20180602
Qihoo-360 HEUR/QVM20.1.8DC8.Malware.Gen 20180602
SentinelOne (Static ML) static engine - malicious 20180225
Symantec ML.Attribute.HighConfidence 20180602
VBA32 BScope.Trojan.Dovs 20180601
Webroot W32.Trojan.Emotet 20180602
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.aqaa 20180602
Ad-Aware 20180602
AegisLab 20180602
AhnLab-V3 20180601
Alibaba 20180601
ALYac 20180602
Antiy-AVL 20180602
Arcabit 20180602
Avast 20180602
Avast-Mobile 20180602
AVG 20180602
AVware 20180602
Babable 20180406
BitDefender 20180602
Bkav 20180601
CAT-QuickHeal 20180601
ClamAV 20180602
CMC 20180601
Comodo 20180602
CrowdStrike Falcon (ML) 20180202
Cybereason None
Cyren 20180602
eGambit 20180602
Emsisoft 20180602
F-Prot 20180602
F-Secure 20180601
Ikarus 20180602
Jiangmin 20180602
Kingsoft 20180602
Malwarebytes 20180602
MAX 20180602
eScan 20180602
NANO-Antivirus 20180602
nProtect 20180602
Palo Alto Networks (Known Signatures) 20180602
Rising 20180602
Sophos AV 20180602
SUPERAntiSpyware 20180602
Symantec Mobile Insight 20180601
Tencent 20180602
TheHacker 20180531
TotalDefense 20180602
TrendMicro 20180602
TrendMicro-HouseCall 20180601
Trustlook 20180602
VIPRE 20180602
ViRobot 20180602
Yandex 20180529
Zillya 20180601
Zoner 20180602
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name SPReview.exe
Internal name SPReview.exe
File version 6.1.7601.17514 (win7sp1_rtm.101119-1850)
Description SP Reviewer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2035-07-30 21:36:11
Entry Point 0x00002681
Number of sections 5
PE sections
Overlays
MD5 fd615ab09c336672aec15a1edbc0eb60
File type data
Offset 221184
Size 1074
Entropy 2.80
PE imports
CloseEncryptedFileRaw
AddAce
CM_Locate_DevNodeW
CertSerializeCertificateStoreElement
CertEnumCRLsInStore
GetObjectType
IpRenewAddress
GetNativeSystemInfo
OpenThread
AttachConsole
SizeofResource
CreateDirectoryExW
lstrlenA
GetExitCodeThread
ExpandEnvironmentStringsA
Process32Next
SetSystemTimeAdjustment
SetProcessWorkingSetSize
ReadFile
GetComputerNameExW
QueueUserWorkItem
Thread32Next
FindFirstFileNameTransactedW
VirtualProtectEx
CancelIo
SetEnvironmentVariableA
LZSeek
acmDriverRemove
acmStreamSize
VarDateFromR8
VarR8FromUI4
NdrStubCall2
RpcMgmtEnableIdleCleanup
I_RpcMapWin32Status
SetupDiDrawMiniIcon
ExtractAssociatedIconW
SHRegEnumUSValueW
SHDeleteKeyW
EncryptMessage
DestroyWindow
DrawTextW
BroadcastSystemMessageA
IsProcessDPIAware
CopyImage
InternetQueryDataAvailable
InternetSetCookieA
mixerGetDevCapsW
Ord(30)
wprintf
RtlInterlockedPopEntrySList
OleCreate
CoGetObjectContext
CoGetMalloc
HICON_UserMarshal
PdhBrowseCountersW
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7601.17514

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
SP Reviewer

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

CharacterSet
Unicode

InitializedDataSize
45056

EntryPoint
0x2681

OriginalFileName
SPReview.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7601.17514 (win7sp1_rtm.101119-1850)

TimeStamp
2035:07:30 22:36:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
SPReview.exe

ProductVersion
6.1.7601.17514

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
172032

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7601.17514

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 48d61eeac1e0902e44232866cc18950e
SHA1 6b6332750848e60a14f41cda6e8789fb049b2c16
SHA256 5716f84dff360e553b50e1d249d842b918d3799fc9b9e3ebf8d08f9fa674738c
ssdeep
3072:1evhwwwZXfofE8CJPkoxgbuh/qC5ZknwS+RR:4vcZXfoEVubuhJ5ZMUP

authentihash ea912665ffac191796e1e7d63b6728a4d90d6402ac64b15986bebc37ed21d662
imphash 702f5ed518a36c804418d2dbad29d2ee
File size 217.0 KB ( 222258 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Dynamic Link Library (generic) (34.3%)
Win32 Executable (generic) (23.5%)
OS/2 Executable (generic) (10.6%)
Clipper DOS Executable (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-06-02 10:32:13 UTC ( 8 months, 3 weeks ago )
Last submission 2018-09-14 02:27:11 UTC ( 5 months, 1 week ago )
File names (17).exe
(35).exe
SPReview.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!