× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 054e8c2e3683b4462f8b207204d5ea17d13420559fdd5fd1023c7ca5b3f5713b
File name: 054e8c2e3683b4462f8b207204d5ea17d13420559fdd5fd1023c7ca5b3f5713b
Detection ratio: 46 / 69
Analysis date: 2018-12-06 01:52:44 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31390473 20181206
AhnLab-V3 Malware/Win32.Generic.C2874700 20181205
ALYac Trojan.Agent.Emotet 20181206
Arcabit Trojan.Autoruns.GenericS.D1DEFB09 20181205
Avast Win32:BankerX-gen [Trj] 20181205
AVG Win32:BankerX-gen [Trj] 20181205
BitDefender Trojan.Autoruns.GenericKDS.31390473 20181205
CAT-QuickHeal Trojan.Csrn 20181205
ClamAV Win.Malware.Emotet-6766201-0 20181205
Comodo Malware@#e2rgf3ftjjkr 20181205
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.b76115 20180225
Cylance Unsafe 20181206
Cyren W32/Trojan.JKND-5954 20181205
Emsisoft Trojan.Autoruns.GenericKDS.31390473 (B) 20181205
Endgame malicious (high confidence) 20181108
ESET-NOD32 Win32/Emotet.BN 20181205
F-Prot W32/Emotet.JZ.gen!Eldorado 20181205
F-Secure Trojan.Autoruns.GenericKDS.31390473 20181205
Fortinet W32/GenKryptik.CSRN!tr 20181205
GData Trojan.Autoruns.GenericKDS.31390473 20181205
Ikarus Trojan-Spy.Win32.Emotet 20181205
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0053b6a31 ) 20181205
K7GW Trojan ( 0054286f1 ) 20181205
Kaspersky Trojan-Banker.Win32.Emotet.bsxu 20181205
Malwarebytes Trojan.Emotet 20181205
McAfee RDN/Generic.grp 20181205
McAfee-GW-Edition BehavesLike.Win32.Virut.ch 20181205
Microsoft Trojan:Win32/Emotet.BE 20181205
eScan Trojan.Autoruns.GenericKDS.31390473 20181205
NANO-Antivirus Trojan.Win32.Emotet.fktfrm 20181205
Palo Alto Networks (Known Signatures) generic.ml 20181206
Panda Trj/GdSda.A 20181205
Qihoo-360 HEUR/QVM19.1.900D.Malware.Gen 20181206
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20181205
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-AOF 20181205
Symantec Trojan.Emotet 20181205
TACHYON Banker/W32.Emotet.135168.BD 20181205
Trapmine malicious.high.ml.score 20181205
TrendMicro TSPY_EMOTET.THABOCAH 20181206
TrendMicro-HouseCall TSPY_EMOTET.THABOCAH 20181206
VBA32 TrojanBanker.Emotet 20181205
Webroot W32.Trojan.Emotet 20181206
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bsxu 20181206
AegisLab 20181206
Alibaba 20180921
Antiy-AVL 20181205
Avast-Mobile 20181205
Avira (no cloud) 20181205
Babable 20180918
Baidu 20181205
Bkav 20181205
CMC 20181205
DrWeb 20181205
eGambit 20181206
Jiangmin 20181205
Kingsoft 20181206
MAX 20181206
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
Tencent 20181206
TheHacker 20181202
TotalDefense 20181206
Trustlook 20181206
ViRobot 20181206
Yandex 20181204
Zillya 20181206
Zoner 20181206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2007 Nexon Corp.

Product NexonMessenger Game Service
Original name nmcogame.dll
Internal name nmcogame
File version 2, 5, 24, 0
Description NexonMessenger Game Service
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-08-21 02:59:10
Entry Point 0x00001624
Number of sections 11
PE sections
PE imports
RegCloseKey
RegEnumValueW
RegSetKeySecurity
JetPrepareUpdate
GetViewportExtEx
GetLargePageMinimum
GetFileSize
CreateFileW
GetCommandLineW
GetSystemDefaultLCID
PulseEvent
DeleteAtom
GetFileType
FindNextFileA
SetMailslotInfo
GetUserDefaultLCID
SafeArrayCreate
NdrAllocate
CountClipboardFormats
GetLastActivePopup
DdeConnectList
GetPhysicalCursorPos
GetWindowInfo
ActivateKeyboardLayout
VerQueryValueA
waveOutGetPosition
midiInStart
OleConvertIStorageToOLESTREAM
Number of PE resources by type
RT_STRING 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
KOREAN 2
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.5.24.0

LanguageCode
Neutral

FileFlagsMask
0x0017

FileDescription
NexonMessenger Game Service

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x1624

OriginalFileName
nmcogame.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2007 Nexon Corp.

FileVersion
2, 5, 24, 0

TimeStamp
2007:08:21 04:59:10+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
nmcogame

ProductVersion
2, 5, 24, 0

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nexon Corp.

CodeSize
8192

ProductName
NexonMessenger Game Service

ProductVersionNumber
2.5.24.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 1c45d9bb761152679a775b368d0aa658
SHA1 10d1f5cd2b38cedf3e532c7c90d54e7a76b982c1
SHA256 054e8c2e3683b4462f8b207204d5ea17d13420559fdd5fd1023c7ca5b3f5713b
ssdeep
3072:TPvR+gGqL3V4YbBU2/J4eckwgFqoD3BN2voo9:TPsk3V4cU2x4ec4oKBMgo

authentihash c045c6aac57b4eb4b0989f1b97a3887e1654ddb27b515bdfa08b2465838a6d09
imphash be31489dfe369e2b0c22734cc0c96d31
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-01 01:37:05 UTC ( 2 months, 3 weeks ago )
Last submission 2019-01-22 07:32:50 UTC ( 1 month ago )
File names 1c45d9bb761152679a775b368d0aa658
nmcogame.dll
nmcogame
1c45d9bb761152679a775b368d0aa658
2TMvuwrT.exe
g1MjmtEUeqh.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!