asterctl.exe

IBIK, LLC

It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘asterctl’.
Publisher:
IBIK, LLC  (signed and verified)

MD5:
3c038277849b7add2196a6ece1620cf7

SHA-1:
5be18b81722f299f63c5e4e30d047ff432c18a73

SHA-256:
b15bbf1de7eb1490d1b30fcc43ac53c6e3a87c5909a4f03aced82b21684e17c7

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 12:30:45 PM UTC  (today)

File size:
7.9 MB (8,310,472 bytes)

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\aster\asterctl.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
11/5/2015 6:26:44 AM

Valid to:
1/23/2018 4:51:37 AM

Subject:
CN="IBIK, LLC", O="IBIK, LLC", L=Moscow, S=Moscow, C=RU

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121D88E3D9EA407112D3BA4F31769DAB134

File PE Metadata
Compilation timestamp:
10/25/2016 6:24:07 AM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:bU7IP+xFq3ZqbWSPV7IeqP5cEjeWg5ufN0e1U/QraYqS7+Af0+LLLLLLLLLLLLLg:Q7A7SPVVqPuEaWtN0IpraYqvAG6SZ

Entry address:
0xBBB2AC

Entry point:
EB, 08, 00, 08, 37, 00, 00, 00, 00, 00, 50, 51, 52, 53, 55, 56, 57, 41, 50, 41, 51, 41, 52, 41, 53, 41, 54, 41, 55, 41, 56, 41, 57, 48, 9C, 48, 81, EC, 08, 00, 00, 00, 0F, AE, 1C, 24, E8, 00, 00, 00, 00, 5D, 48, 81, ED, 33, 00, 00, 00, 48, 81, ED, AC, B2, BB, 00, 48, 81, EC, 20, 00, 00, 00, E9, 04, 00, 00, 00, 05, 0F, 61, 5A, 48, C7, C0, AC, B2, BB, 00, 48, 01, E8, 48, 81, C0, 84, 00, 00, 00, 48, C7, C1, 0E, 06, 00, 00, 48, C7, C2, 9B, EB, 39, EB, 30, 10, 48, FF, C0, 48, FF, C9, 0F, 85, F2, FF, FF, FF, E9...
 
[+]

Code size:
1.8 MB (1,894,400 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
asterctl

Command:
C:\Program Files\aster\asterctl.exe -autostart


Scan asterctl.exe - Powered by Reason Core Security