× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48e97cb513485c89e945cb3a484a3b48067161298a82837be174a7f570a95522
File name: output.114911104.txt
Detection ratio: 38 / 71
Analysis date: 2019-01-11 10:27:17 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.448095 20190111
AhnLab-V3 Trojan/Win32.NanoBot.R251469 20190111
ALYac Gen:Variant.Razy.448095 20190111
Arcabit Trojan.Razy.D6D65F 20190111
Avast Win32:PWSX-gen [Trj] 20190111
AVG Win32:PWSX-gen [Trj] 20190111
Avira (no cloud) TR/Kryptik.lxaie 20190111
BitDefender Gen:Variant.Razy.448095 20190111
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181023
Cybereason malicious.698552 20190109
Cylance Unsafe 20190111
Cyren W32/Trojan.JPAR-0887 20190111
DrWeb Trojan.DownLoader13.38206 20190111
Emsisoft Gen:Variant.Razy.448095 (B) 20190111
ESET-NOD32 a variant of MSIL/GenKryptik.CVYI 20190111
F-Secure Gen:Variant.Razy.448095 20190111
Fortinet MSIL/GenKryptik.CVYI!tr 20190111
GData MSIL.Backdoor.Nancat.OSRJLX 20190111
Ikarus Trojan.MSIL.Krypt 20190110
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005451a91 ) 20190111
K7GW Trojan ( 005451a91 ) 20190111
Kaspersky HEUR:Backdoor.MSIL.NanoBot.gen 20190111
McAfee GenericRXGT-TI!BDCC98D69855 20190111
McAfee-GW-Edition Artemis!Trojan 20190111
Microsoft Trojan:Win32/Bitrep.A 20190111
eScan Gen:Variant.Razy.448095 20190111
NANO-Antivirus Trojan.Win32.GenKryptik.flxrcu 20190111
Palo Alto Networks (Known Signatures) generic.ml 20190111
Qihoo-360 Win32/Backdoor.BO.5c9 20190111
Rising Backdoor.NanoBot!8.28C (CLOUD) 20190111
SentinelOne (Static ML) static engine - malicious 20181223
Symantec ML.Attribute.HighConfidence 20190110
Tencent Win32.Trojan.Inject.Auto 20190111
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_GEN.R002C0WAA19 20190111
TrendMicro-HouseCall TROJ_GEN.R002C0WAA19 20190111
ZoneAlarm by Check Point HEUR:Backdoor.MSIL.NanoBot.gen 20190111
Acronis 20190110
AegisLab 20190111
Alibaba 20180921
Antiy-AVL 20190111
Avast-Mobile 20190111
Babable 20180918
Baidu 20190111
Bkav 20190108
CAT-QuickHeal 20190110
ClamAV 20190111
CMC 20190110
Comodo 20190111
eGambit 20190111
Endgame 20181108
F-Prot 20190111
Jiangmin 20190111
Kingsoft 20190111
Malwarebytes 20190111
MAX 20190111
Panda 20190110
Sophos AV 20190111
SUPERAntiSpyware 20190109
TACHYON 20190111
TheHacker 20190106
TotalDefense 20190111
Trustlook 20190111
VBA32 20190110
VIPRE 20190110
ViRobot 20190111
Webroot 20190111
Yandex 20190110
Zillya 20190110
Zoner 20190111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2019 new year release

Product ctlApp
Original name ctlApp.exe
Internal name ctlApp.exe
File version 1.0.0.0
Comments ctlApp
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-10 02:21:09
Entry Point 0x000B22AE
Number of sections 3
.NET details
Module Version ID bc54a2ba-aab6-4929-9912-3c76e3980d32
TypeLib ID ef135940-fdaa-4dc7-9cb1-4139244d8de2
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 9
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
ctlApp

InitializedDataSize
372736

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.0

EntryPoint
0xb22ae

OriginalFileName
ctlApp.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2019 new year release

FileVersion
1.0.0.0

TimeStamp
2019:01:10 03:21:09+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ctlApp.exe

ProductVersion
1.0.0.0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
721920

ProductName
ctlApp

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
3.0.0.0

File identification
MD5 bdcc98d698552059ed43da2aecb28446
SHA1 7351b9557f2715603540a43cd03cdb9e7b9933ad
SHA256 48e97cb513485c89e945cb3a484a3b48067161298a82837be174a7f570a95522
ssdeep
6144:ud+WlWpvIikNk+f0QJESI045RLLvDHgKt9hw4Z9ShaQyiNXjM6wiLatcGvKpA/:puBf0qEt04L3vDHVr+4ZM5nxS4atccd

authentihash a8b7fc097078fc5294729196dba307bf040ca3dbf9da51f177d280d9e20f4af6
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 1.0 MB ( 1095168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (62.0%)
Win64 Executable (generic) (23.4%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.8%)
OS/2 Executable (generic) (1.7%)
Tags
peexe assembly

VirusTotal metadata
First submission 2019-01-10 13:33:29 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-11 10:27:17 UTC ( 1 month, 1 week ago )
File names ctlApp.exe
uwa.exe
output.114911104.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!