× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 22e10e8d63c0b331535290111d6e1866d793701cb3bd45f4c28362059337c6b2
File name: Standardize Hopeful
Detection ratio: 44 / 67
Analysis date: 2018-09-11 00:22:50 UTC ( 3 months, 1 week ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40416317 20180910
AhnLab-V3 Spyware/Win32.Zbot.C2677863 20180910
ALYac Trojan.Fuerboos 20180910
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20180911
Arcabit Trojan.Generic.D268B43D 20180910
Avast Win32:Malware-gen 20180910
AVG Win32:Malware-gen 20180910
AVware Trojan.Win32.Generic!BT 20180910
BitDefender Trojan.GenericKD.40416317 20180910
Bkav W32.eHeur.Malware12 20180906
CAT-QuickHeal Trojan.Fuerboos 20180909
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180911
Cyren W32/Trojan.ZWOP-5352 20180910
DrWeb Trojan.PWS.Stealer.23680 20180910
Emsisoft Trojan.GenericKD.40416317 (B) 20180910
Endgame malicious (high confidence) 20180730
ESET-NOD32 Win32/PSW.Fareit.L 20180910
F-Secure Trojan.GenericKD.40416317 20180910
Fortinet W32/Fareit.L!tr.pws 20180910
Ikarus Trojan-PSW.Fareit 20180910
Sophos ML heuristic 20180717
Jiangmin Backdoor.Androm.abks 20180910
K7AntiVirus Password-Stealer ( 004d5a661 ) 20180910
K7GW Password-Stealer ( 004d5a661 ) 20180910
Kaspersky Backdoor.Win32.Androm.qgki 20180910
Malwarebytes Spyware.LokiBot 20180910
McAfee RDN/Generic PWS.y 20180910
McAfee-GW-Edition BehavesLike.Win32.Ransom.fc 20180910
Microsoft Trojan:Win32/Occamy.C 20180910
eScan Trojan.GenericKD.40416317 20180910
Palo Alto Networks (Known Signatures) generic.ml 20180911
Panda Trj/GdSda.A 20180910
Qihoo-360 HEUR/QVM10.2.533D.Malware.Gen 20180911
Rising Backdoor.Androm!8.113 (CLOUD) 20180910
Sophos AV Mal/Generic-S 20180910
Symantec Trojan.Gen.2 20180910
Tencent Win32.Backdoor.Androm.Suxn 20180911
TrendMicro TSPY_ZBOT.SMAU 20180910
TrendMicro-HouseCall TSPY_ZBOT.SMAU 20180910
VIPRE Trojan.Win32.Generic!BT 20180910
Webroot W32.Infostealer.Zeus 20180911
Zillya Trojan.GenericKD.Win32.163072 20180910
ZoneAlarm by Check Point Backdoor.Win32.Androm.qgki 20180910
AegisLab 20180910
Alibaba 20180713
Avast-Mobile 20180910
Avira (no cloud) 20180910
Babable 20180907
Baidu 20180910
ClamAV 20180910
CMC 20180910
Comodo 20180910
Cybereason 20180308
eGambit 20180911
F-Prot 20180910
Kingsoft 20180911
MAX 20180911
NANO-Antivirus 20180910
SentinelOne (Static ML) 20180830
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180905
TACHYON 20180910
TheHacker 20180907
TotalDefense 20180910
Trustlook 20180911
VBA32 20180910
ViRobot 20180910
Yandex 20180910
Zoner 20180910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright ©Tiger Global Management 2000 - 2014 KG and its Licensors

Product Standardize Hopeful
Original name Standardize Hopeful
Internal name Standardize Hopeful
File version 5.1.5.4
Description Frster Readout Safe Too Traumatic
Comments Frster Readout Safe Too Traumatic
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-20 19:10:54
Entry Point 0x0001478E
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
ImageList_GetImageCount
ImageList_Create
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Add
CertDuplicateStore
DhcpRpcFreeMemory
DhcpGetSubnetInfo
GetDeviceCaps
ExcludeClipRect
EnumICMProfilesA
DeleteDC
CreateRectRgn
SelectObject
BitBlt
GetStockObject
CreateCompatibleBitmap
SelectPalette
CreateFontIndirectA
ExtTextOutA
CombineRgn
SetStretchBltMode
SetBkColor
CreateCompatibleDC
DeleteObject
RealizePalette
CheckColorsInGamut
GetIpNetTable
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
SystemTimeToTzSpecificLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
SetStdHandle
GetCPInfo
LoadLibraryW
GetStringTypeA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
FreeLibrary
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
SetLastError
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetConsoleScreenBufferSize
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
SetFilePointer
CreateSemaphoreA
SetUnhandledExceptionFilter
Module32NextW
IsProcessorFeaturePresent
TerminateProcess
WriteConsoleA
VirtualQuery
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
lstrcpyW
FindNextFileW
GetComputerNameExW
GetProcessWorkingSetSize
FindFirstFileW
SetCommState
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
IsDBCSLeadByte
GetCommState
lstrlenW
Module32FirstW
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
WideCharToMultiByte
HeapSize
GetCommandLineA
InterlockedCompareExchange
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetFileAttributesExW
SizeofResource
IsValidCodePage
UnmapViewOfFile
WriteFile
VirtualFree
Sleep
FindResourceA
VirtualAlloc
GradientFill
MCIWndCreateA
Ord(2)
NetServerGetInfo
NetApiBufferFree
Ord(24)
VarUI4FromStr
VariantTimeToSystemTime
RpcStringFreeA
UuidToStringA
UuidCreate
SHAddToRecentDocs
ShellExecuteA
PathFileExistsW
PathRemoveFileSpecW
PathCompactPathA
ColorRGBToHLS
SetFocus
DrawEdge
GetParent
GetMessageA
GetScrollInfo
BeginPaint
HideCaret
EnumWindows
GetMonitorInfoA
PostQuitMessage
DefWindowProcA
ShowWindow
DrawFrameControl
MapWindowPoints
BeginDeferWindowPos
IsWindow
GetWindowRect
DispatchMessageA
EndPaint
LoadImageA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
EndDialog
SetScrollInfo
GetMenuItemInfoA
DrawTextA
SetWindowTextA
UnregisterClassA
ScrollWindow
GetSystemMetrics
SendMessageA
GetClientRect
GetDlgItem
CreateDialogParamA
SetScrollRange
SetWindowPos
MonitorFromWindow
InvalidateRect
GetWindowLongA
CreateWindowExA
GetActiveWindow
GetTopWindow
IsDlgButtonChecked
CharNextA
InflateRect
CallWindowProcA
GetSystemMenu
GetDC
ReleaseDC
wsprintfW
IsDialogMessageA
DestroyWindow
DeleteUrlCacheGroup
FtpGetFileW
CommitUrlCacheEntryW
CreateMD5SSOHash
DeleteUrlCacheEntryW
CreateUrlCacheGroup
mmioSetInfo
CoUninitialize
CoInitialize
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemRealloc
CoCreateInstance
CreateBindCtx
CoTaskMemFree
Number of PE resources by type
RT_STRING 14
PNG 8
RT_DIALOG 5
RT_ICON 5
RT_CURSOR 5
RCDATA 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 43
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
Frster Readout Safe Too Traumatic

Languages
English

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.5.4

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Frster Readout Safe Too Traumatic

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
195072

PrivateBuild
5.1.5.4

EntryPoint
0x1478e

OriginalFileName
Standardize Hopeful

MIMEType
application/octet-stream

LegalCopyright
Copyright Tiger Global Management 2000 - 2014 KG and its Licensors

FileVersion
5.1.5.4

TimeStamp
2018:08:20 20:10:54+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Standardize Hopeful

ProductVersion
5.1.5.4

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tiger Global Management

CodeSize
148992

ProductName
Standardize Hopeful

ProductVersionNumber
5.1.5.4

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5473524383440f83d59b2eadc7495b61
SHA1 dec4fdbd8139b74fe87af50e1033e23e0b64d61b
SHA256 22e10e8d63c0b331535290111d6e1866d793701cb3bd45f4c28362059337c6b2
ssdeep
6144:/ONbaQm3NuOHwvIhbVokh3QU/Hhdeopow:GVaQm3NuOGIhbV9gUPhsiow

authentihash e84c1ee9cb2c9cfdd25d148a0568f068037e6a78152229f2a27f409bc470b4ac
imphash 252c1e92966e498ad7cc4227a8424e86
File size 337.0 KB ( 345088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (40.0%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-21 00:11:50 UTC ( 3 months, 4 weeks ago )
Last submission 2018-08-22 05:55:15 UTC ( 3 months, 4 weeks ago )
File names zbetcheckin_tracker_fishy.exe
Standardize Hopeful
fishy.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
DNS requests
TCP connections