× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 321e0dc022c65e03c12948b45a9c7cc584fbcedf9dcf242343089312d259d0b8
File name: 21426695
Detection ratio: 27 / 70
Analysis date: 2019-01-11 12:03:52 UTC ( 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.448095 20190111
AhnLab-V3 Trojan/Win32.NanoBot.R251469 20190111
ALYac Gen:Variant.Razy.448095 20190111
Arcabit Trojan.Razy.D6D65F 20190111
Avast Win32:PWSX-gen [Trj] 20190111
AVG Win32:PWSX-gen [Trj] 20190111
BitDefender Gen:Variant.Razy.448095 20190111
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.0add62 20190109
Cylance Unsafe 20190111
DrWeb Trojan.DownLoader13.38206 20190111
Emsisoft Gen:Variant.Razy.448095 (B) 20190111
ESET-NOD32 a variant of MSIL/GenKryptik.CVYI 20190111
F-Secure Gen:Variant.Razy.448095 20190111
Fortinet MSIL/GenKryptik.CVYI!tr 20190111
GData Gen:Variant.Razy.448095 20190111
Ikarus Trojan.MSIL.Krypt 20190111
Sophos ML heuristic 20181128
Kaspersky HEUR:Backdoor.MSIL.NanoBot.gen 20190111
MAX malware (ai score=84) 20190111
McAfee GenericRXGT-TI!C0848820ADD6 20190111
eScan Gen:Variant.Razy.448095 20190111
Panda Trj/GdSda.A 20190110
Qihoo-360 HEUR/QVM03.0.7975.Malware.Gen 20190111
SentinelOne (Static ML) static engine - malicious 20181223
Trapmine malicious.high.ml.score 20190103
ZoneAlarm by Check Point HEUR:Backdoor.MSIL.NanoBot.gen 20190111
Acronis 20190110
AegisLab 20190111
Alibaba 20180921
Antiy-AVL 20190111
Avast-Mobile 20190111
Avira (no cloud) 20190111
Babable 20180918
Baidu 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190111
CMC 20190110
Comodo 20190111
Cyren 20190111
eGambit 20190111
Endgame 20181108
F-Prot 20190111
Jiangmin 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Malwarebytes 20190111
McAfee-GW-Edition 20190111
Microsoft 20190111
NANO-Antivirus 20190111
Palo Alto Networks (Known Signatures) 20190111
Rising 20190111
Sophos AV 20190111
SUPERAntiSpyware 20190109
Symantec 20190111
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
TotalDefense 20190111
TrendMicro 20190111
TrendMicro-HouseCall 20190111
Trustlook 20190111
VBA32 20190110
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2019 new year release

Product ctlApp
Original name ctlApp.exe
Internal name ctlApp.exe
File version 1.0.0.0
Comments ctlApp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-11 08:37:19
Entry Point 0x0008198E
Number of sections 3
.NET details
Module Version ID bc54a2ba-aab6-4929-9912-3c76e3980d32
TypeLib ID ef135940-fdaa-4dc7-9cb1-4139244d8de2
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 9
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
ctlApp

InitializedDataSize
372736

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.0

EntryPoint
0x8198e

OriginalFileName
ctlApp.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2019 new year release

FileVersion
1.0.0.0

TimeStamp
2019:01:11 00:37:19-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
ctlApp.exe

ProductVersion
1.0.0.0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
522752

ProductName
ctlApp

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
3.0.0.0

File identification
MD5 c0848820add6287f7d0437e3defaae83
SHA1 a684738c27eca8456eac48b24f1fa6d0e50b3aff
SHA256 321e0dc022c65e03c12948b45a9c7cc584fbcedf9dcf242343089312d259d0b8
ssdeep
3072:4p5wyC/+f9KTwkmiWqsN9c4CEM/nC2jwUX3l4LbdxHKGTXxAaN:EfGsBCf/nJjwUX3lGdj

authentihash 496fa8a531d7e7abd7701951cd7354fd5105d570469cd82b3bad39cec668a431
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 875.0 KB ( 896000 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (62.0%)
Win64 Executable (generic) (23.4%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.8%)
OS/2 Executable (generic) (1.7%)
Tags
peexe assembly

VirusTotal metadata
First submission 2019-01-11 12:03:52 UTC ( 1 month ago )
Last submission 2019-01-11 12:03:52 UTC ( 1 month ago )
File names ctlApp.exe
nd.exe
21426695
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!