× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7544141eb65a5bb0c2e3e4909af000006f75afc70cad56107dbf5445dfa830a0
File name: listingto.gif
Detection ratio: 10 / 65
Analysis date: 2018-06-19 12:30:32 UTC ( 11 months, 1 week ago ) View latest
Antivirus Result Update
AegisLab Ml.Attribute.Gen!c 20180619
Bkav W32.eHeur.Malware14 20180619
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20180530
Cylance Unsafe 20180619
Endgame malicious (moderate confidence) 20180612
Palo Alto Networks (Known Signatures) generic.ml 20180619
Qihoo-360 Win32/Trojan.3fe 20180619
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20180619
Symantec ML.Attribute.HighConfidence 20180619
Webroot W32.Rogue.Gen 20180619
Ad-Aware 20180619
AhnLab-V3 20180619
Alibaba 20180619
ALYac 20180619
Antiy-AVL 20180619
Arcabit 20180619
Avast 20180619
Avast-Mobile 20180619
AVG 20180619
Avira (no cloud) 20180619
AVware 20180618
Babable 20180406
Baidu 20180615
BitDefender 20180619
CAT-QuickHeal 20180619
ClamAV 20180619
CMC 20180619
Comodo 20180619
Cybereason 20180225
Cyren 20180619
DrWeb 20180619
eGambit 20180619
Emsisoft 20180619
ESET-NOD32 20180619
F-Prot 20180619
F-Secure 20180619
Fortinet 20180619
GData 20180619
Sophos ML 20180601
Jiangmin 20180619
K7AntiVirus 20180619
K7GW 20180619
Kingsoft 20180619
Malwarebytes 20180619
MAX 20180619
McAfee 20180619
McAfee-GW-Edition 20180619
Microsoft 20180619
eScan 20180619
NANO-Antivirus 20180619
Panda 20180618
Rising 20180619
SentinelOne (Static ML) 20180618
Sophos AV 20180619
Symantec Mobile Insight 20180619
TACHYON 20180619
Tencent 20180619
TheHacker 20180613
TrendMicro 20180619
TrendMicro-HouseCall 20180619
Trustlook 20180619
VBA32 20180619
VIPRE 20180619
ViRobot 20180619
Yandex 20180618
Zillya 20180618
ZoneAlarm by Check Point 20180619
Zoner 20180619
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c). All rights reserved. Boeing

Product Startelement
Original name Startelement.exe
Description Competitor Consumed Zettabytezip Acreating Frmulae
Comments Competitor Consumed Zettabytezip Acreating Frmulae
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-19 07:02:15
Entry Point 0x00089DA0
Number of sections 3
PE sections
PE imports
RegCloseKey
ImageList_Add
SaveDC
gluLookAt
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
DispCallFunc
RpcStringBindingComposeA
SetupBackupErrorA
DragFinish
PathIsUNCA
mmioSetInfo
OpenPrinterA
ChooseFontA
SymGetSymNext
Ord(278)
CoTaskMemFree
Number of PE resources by type
Struct(3000) 8
UTFILE 8
RCDATA 2
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 22
PE resources
ExifTool file metadata
CodeSize
245760

SubsystemVersion
4.0

Comments
Competitor Consumed Zettabytezip Acreating Frmulae

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.6.5.5

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Competitor Consumed Zettabytezip Acreating Frmulae

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
73728

PrivateBuild
3.6.5.5

EntryPoint
0x89da0

OriginalFileName
Startelement.exe

MIMEType
application/octet-stream

LegalCopyright
(c). All rights reserved. Boeing

TimeStamp
2018:06:19 08:02:15+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
3.6.5.5

UninitializedDataSize
315392

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Boeing

LegalTrademarks
(c). All rights reserved. Boeing

ProductName
Startelement

ProductVersionNumber
3.6.5.5

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 402b25b11cdbb0eda1c3bcb55e3f3e49
SHA1 cea0efe4a7b533bd1b7509f7f4bd053c09095df1
SHA256 7544141eb65a5bb0c2e3e4909af000006f75afc70cad56107dbf5445dfa830a0
ssdeep
6144:aalCHm0AyTTM3pY9ypQ7MMoPWah9n6Xn6jJ0vSEkOnpnZE/uv6Z:aagmVgTipY9ypQ761jISR6pnXv6Z

authentihash e2e40a8cf4133ebbb50367e13d4962e27caa36735a8c4893522c403876b56bc6
imphash 71ccbdeaae7da787f7f43fd2ce5eba63
File size 312.0 KB ( 319488 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe upx

VirusTotal metadata
First submission 2018-06-19 09:04:45 UTC ( 11 months, 1 week ago )
Last submission 2018-09-10 06:26:47 UTC ( 8 months, 2 weeks ago )
File names listingto.gif
f8e6514c51bee8b1dfd934c54d06352ca8858939
Startelement.exe
7544141eb65a5bb0c2e3e4909af000006f75afc70cad56107dbf5445dfa830a0.bin
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.