× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2c9750b8c9d183e1c0e123cc1c497206ef942cf0e520a8904f893bf5a8af572d
File name: TCPOptimizer.exe
Detection ratio: 1 / 66
Analysis date: 2017-11-06 01:06:35 UTC ( 1 year, 5 months ago ) View latest
Antivirus Result Update
Cylance Unsafe 20171106
Ad-Aware 20171105
AegisLab 20171105
AhnLab-V3 20171105
Alibaba 20170911
ALYac 20171104
Antiy-AVL 20171103
Arcabit 20171105
Avast 20171105
Avast-Mobile 20171105
AVG 20171105
Avira (no cloud) 20171105
AVware 20171105
Baidu 20171103
BitDefender 20171105
Bkav 20171104
CAT-QuickHeal 20171104
ClamAV 20171103
CMC 20171104
Comodo 20171105
CrowdStrike Falcon (ML) 20171016
Cybereason 20171030
Cyren 20171106
DrWeb 20171106
eGambit 20171106
Emsisoft 20171106
Endgame 20171024
ESET-NOD32 20171105
F-Prot 20171105
F-Secure 20171105
Fortinet 20171105
GData 20171105
Ikarus 20171105
Sophos ML 20170914
Jiangmin 20171105
K7AntiVirus 20171105
K7GW 20171105
Kaspersky 20171105
Kingsoft 20171106
Malwarebytes 20171105
MAX 20171106
McAfee 20171031
McAfee-GW-Edition 20171105
Microsoft 20171105
eScan 20171106
NANO-Antivirus 20171106
nProtect 20171105
Palo Alto Networks (Known Signatures) 20171106
Panda 20171105
Qihoo-360 20171106
SentinelOne (Static ML) 20171019
Sophos AV 20171106
SUPERAntiSpyware 20171105
Symantec 20171105
Symantec Mobile Insight 20171103
Tencent 20171106
TheHacker 20171102
TrendMicro 20171105
TrendMicro-HouseCall 20171106
Trustlook 20171106
VBA32 20171104
VIPRE 20171106
ViRobot 20171105
Webroot 20171106
WhiteArmor 20171104
Yandex 20171102
Zillya 20171104
ZoneAlarm by Check Point 20171105
Zoner 20171105
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2001-2016

Product SG TCP Optimizer Application
Original name TCPOptimizer.exe
Internal name TCP Optimizer
File version 4, 0, 6, 0
Description SG TCP Optimizer
Comments Coded and (c) Speed Guide, Inc. - webmaster@speedguide.net / outsorcing@gmail.com
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-09-07 14:34:51
Entry Point 0x00031CEF
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
OpenProcessToken
RegSetValueExA
RegQueryValueA
RegQueryValueExA
InitiateSystemShutdownA
AdjustTokenPrivileges
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
PropertySheetA
ImageList_Destroy
_TrackMouseEvent
ImageList_AddMasked
ImageList_LoadImageA
DestroyPropertySheetPage
ImageList_Create
Ord(17)
CreatePropertySheetPageA
GetWindowExtEx
Polygon
SetBkMode
PatBlt
CreatePen
SaveDC
TextOutA
LineTo
CreateRectRgnIndirect
LPtoDP
GetClipBox
SetMapMode
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SetPixel
EndDoc
SelectObject
StartPage
DeleteObject
IntersectClipRect
BitBlt
GetCharWidthA
SetTextColor
GetDeviceCaps
CreateFontA
StartDocA
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
GetTextExtentPointA
RoundRect
SelectClipRgn
EnumFontFamiliesExA
CreateCompatibleDC
ScaleViewportExtEx
EndPage
CreateFontIndirectA
SetViewportExtEx
GetTextExtentPoint32A
SetWindowExtEx
GetTextColor
CreateSolidBrush
Polyline
DPtoLP
Escape
GetViewportExtEx
CopyMetaFileA
GetBkColor
CreateCompatibleBitmap
MoveToEx
SetThreadLocale
GetStdHandle
VerifyVersionInfoA
FileTimeToSystemTime
GetFileAttributesA
SetEvent
HeapDestroy
IsBadCodePtr
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
FindResourceExA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
WaitForSingleObject
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
GetEnvironmentVariableA
GlobalFindAtomA
ExitProcess
GetVersionExA
GetModuleFileNameA
VerSetConditionMask
GetVolumeInformationA
GetPrivateProfileStringA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
CreateThread
CreatePipe
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ExitThread
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SleepEx
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GlobalSize
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetPrivateProfileIntA
GetProcAddress
GetProcessHeap
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
DuplicateHandle
GlobalLock
GetTimeZoneInformation
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
WinExec
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
SuspendThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetVersion
SizeofResource
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
ResetEvent
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
Ord(251)
ShellExecuteA
MapWindowPoints
GetMessagePos
SetMenuItemBitmaps
DrawStateA
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
SetScrollPos
IsWindow
DispatchMessageA
ScreenToClient
GetWindowLongA
SetMenuItemInfoA
GrayStringA
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetAsyncKeyState
DrawTextA
GetDlgCtrlID
GetClassInfoA
wvsprintfA
GetMenu
UnregisterClassA
IsClipboardFormatAvailable
SendMessageA
GetClientRect
SetWindowContextHelpId
SetMenuDefaultItem
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CharUpperA
CopyAcceleratorTableA
GetActiveWindow
ExcludeUpdateRgn
GetTopWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
MapDialogRect
UpdateWindow
SetPropA
EqualRect
CreateCaret
ShowWindow
GetPropA
GetNextDlgGroupItem
ValidateRect
EnableWindow
SetWindowPlacement
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
LoadStringA
SetClipboardData
IsZoomed
GetWindowPlacement
IsIconic
RegisterClassA
TrackPopupMenuEx
TabbedTextOutA
GetSubMenu
SetTimer
FillRect
CharNextA
GetSysColorBrush
IsWindowUnicode
EndPaint
GetCursorPos
PtInRect
IsChild
IsDialogMessageA
SetFocus
ReleaseCapture
PostMessageA
BeginPaint
OffsetRect
SetCaretPos
GetScrollPos
KillTimer
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
DrawIcon
IntersectRect
SetWindowLongA
EndDialog
RemovePropA
CreatePopupMenu
ShowCaret
DrawFocusRect
GetLastActivePopup
CreateWindowExA
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongA
GetCapture
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemCount
BeginDeferWindowPos
GetMenuState
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
OpenClipboard
EmptyClipboard
ReleaseDC
GetScrollRange
GetScrollInfo
LoadMenuA
HideCaret
CopyRect
CreateDialogIndirectParamA
SetWindowTextA
MessageBeep
CheckMenuItem
DeferWindowPos
ShowScrollBar
AppendMenuA
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
IsWindowVisible
GetDesktopWindow
WinHelpA
FrameRect
SetRect
InvalidateRect
wsprintfA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
CloseClipboard
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
htonl
inet_addr
WSACleanup
WSAStartup
gethostbyname
ioctlsocket
GetFileTitleA
GetOpenFileNameA
PrintDlgA
GetSaveFileNameA
GetAdaptersInfo
CreateStreamOnHGlobal
OleUninitialize
OleSetClipboard
OleInitialize
CoRevokeClassObject
OleFlushClipboard
ReleaseStgMedium
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
StgOpenStorageOnILockBytes
CoGetClassObject
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
OleGetClipboard
OleIsCurrentClipboard
OleDuplicateData
CoTaskMemFree
CreateILockBytesOnHGlobal
CoTaskMemAlloc
Number of PE resources by type
RT_DIALOG 24
RT_STRING 17
RT_BITMAP 12
RT_ICON 10
Struct(240) 6
RT_MENU 4
RT_CURSOR 3
RT_GROUP_ICON 3
RT_GROUP_CURSOR 2
BINARY 1
GIF 1
AVI 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 83
BULGARIAN DEFAULT 2
PE resources
ExifTool file metadata
CodeSize
352256

SubsystemVersion
4.0

Comments
Coded and (c) Speed Guide, Inc. - webmaster@speedguide.net / outsorcing@gmail.com

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.0.6.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
SG TCP Optimizer

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
712704

EntryPoint
0x31cef

OriginalFileName
TCPOptimizer.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2001-2016

FileVersion
4, 0, 6, 0

TimeStamp
2016:09:07 15:34:51+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
TCP Optimizer

ProductVersion
4, 0, 6, 0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Speed Guide Inc.

LegalTrademarks
Speed Guide Inc

ProductName
SG TCP Optimizer Application

ProductVersionNumber
4.0.6.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 5367619c58caf5c0d2e396b55e1aa0f5
SHA1 3598366f6795391d0a5a3cd49211c901b0a17218
SHA256 2c9750b8c9d183e1c0e123cc1c497206ef942cf0e520a8904f893bf5a8af572d
ssdeep
6144:o6LPMkdFdgs9rhQ27bwQpggQVcUoHA/AxK5ZqxQtMmRzY8yIlKiiU65qs:oYN08u8bwQpg7cUnAxK6etMmR8Iu5V

authentihash f00657f5b63cf275f7410c47d945c865f336fe275e8830cf2d782372ec05f3ed
imphash 28ba080f63ec220606ca06644995c608
File size 680.0 KB ( 696320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (29.5%)
Win64 Executable (generic) (26.1%)
Microsoft Visual C++ compiled executable (generic) (15.6%)
Windows screen saver (12.4%)
Win32 Dynamic Link Library (generic) (6.2%)
Tags
peexe via-tor

VirusTotal metadata
First submission 2016-09-07 17:50:02 UTC ( 2 years, 7 months ago )
Last submission 2019-02-24 01:07:08 UTC ( 2 months ago )
File names TCP Optimizer 4 - speedguide.net.exe
TCPOptimizer.exe
TCPOptimizer(1).exe
6-TCPOptimizer.exe
TCPOptimizer.exe
TCPOptimizer 4.06.exe
TCPOptimizer.exe
TCPOptimizer.exe
TCPOptimizer(2).exe
SpeedGuide.net TCP Optimizer_4.0.6.exe
TCPOptimizer_4_majorgeeks.exe
1012475
TCPOptimizer2.exe
TCPOptimizer (3).exe
TCPOptimizer.exe
TCPOptimizer.exe
Softpedia TCPOptimizer.exe
TCPOptimizer v4.exe
TCPOptimizer.ex_
TCP406Optimizer(1).exe
TCPOptimizer0.exe
TCPOptimizer 4.exe
TCPOptimizer.exe
TCPOptimizer.exe
TCP406Optimizer.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
UDP communications