× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7195110df7299e15378fbdf82ec0236004d93db3bcff277f5affec5abd99ccc9
File name: 424.exe
Detection ratio: 48 / 69
Analysis date: 2018-12-06 00:03:21 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31390225 20181205
AegisLab Trojan.Win32.Emotet.4!c 20181205
AhnLab-V3 Trojan/Win32.Banki.R247004 20181205
ALYac Trojan.Agent.Emotet 20181205
Arcabit Trojan.Autoruns.GenericS.D1DEFA11 20181205
Avast Win32:BankerX-gen [Trj] 20181205
AVG Win32:BankerX-gen [Trj] 20181205
BitDefender Trojan.Autoruns.GenericKDS.31390225 20181205
CAT-QuickHeal Trojan.Fuerboos 20181205
ClamAV Win.Malware.Emotet-6766201-0 20181205
Comodo Malware@#1sv8wy04ugwc8 20181205
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.f65cc4 20180225
Cylance Unsafe 20181206
Cyren W32/Emotet.JZ.gen!Eldorado 20181205
Emsisoft Trojan.Autoruns.GenericKDS.31390225 (B) 20181205
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNLL 20181205
F-Prot W32/Emotet.JZ.gen!Eldorado 20181205
F-Secure Trojan.Autoruns.GenericKDS.31390225 20181205
Fortinet W32/GenKryptik.CSRN!tr 20181205
Ikarus Trojan-Banker.Emotet 20181205
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0053b6a31 ) 20181205
K7GW Trojan ( 0054286f1 ) 20181205
Kaspersky Trojan-Banker.Win32.Emotet.bswm 20181205
Malwarebytes Trojan.Emotet 20181205
MAX malware (ai score=99) 20181206
McAfee Emotet-FJR!C70AAF6F65CC 20181205
McAfee-GW-Edition BehavesLike.Win32.Virut.ch 20181205
Microsoft Trojan:Win32/Emotet.BE 20181205
eScan Trojan.Autoruns.GenericKDS.31390225 20181205
NANO-Antivirus Trojan.Win32.Emotet.fkuzfm 20181205
Palo Alto Networks (Known Signatures) generic.ml 20181206
Panda Trj/GdSda.A 20181205
Qihoo-360 HEUR/QVM20.1.8F72.Malware.Gen 20181206
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20181205
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Troj/Emotet-ANM 20181205
Symantec Trojan.Emotet 20181205
Tencent Win32.Trojan-banker.Emotet.Swas 20181206
Trapmine malicious.high.ml.score 20181205
TrendMicro TSPY_EMOTET.THABOCAH 20181206
TrendMicro-HouseCall TSPY_EMOTET.THABOCAH 20181206
VBA32 TrojanBanker.Emotet 20181205
VIPRE Trojan.Win32.Generic!BT 20181206
Webroot W32.Trojan.Emotet 20181206
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bswm 20181205
Alibaba 20180921
Antiy-AVL 20181205
Avast-Mobile 20181205
Avira (no cloud) 20181205
Babable 20180918
Baidu 20181205
Bkav 20181205
CMC 20181205
DrWeb 20181205
eGambit 20181206
Jiangmin 20181205
Kingsoft 20181206
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TACHYON 20181205
TheHacker 20181202
TotalDefense 20181206
Trustlook 20181206
ViRobot 20181205
Yandex 20181204
Zillya 20181204
Zoner 20181205
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2007 Nexon Corp.

Product NexonMessenger Game Service
Original name nmcogame.dll
Internal name nmcogame
File version 2, 5, 24, 0
Description NexonMessenger Game Service
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-08-21 02:59:10
Entry Point 0x000015ED
Number of sections 7
PE sections
PE imports
RegCloseKey
RegEnumValueW
RegSetKeySecurity
JetPrepareUpdate
GetViewportExtEx
GetLargePageMinimum
GetFileSize
CreateFileW
GetCommandLineW
GetSystemDefaultLCID
PulseEvent
DeleteAtom
GetFileType
FindNextFileA
GetUserDefaultLCID
SetMailslotInfo
SafeArrayCreate
NdrAllocate
CountClipboardFormats
GetLastActivePopup
DdeConnectList
GetPhysicalCursorPos
GetWindowInfo
ActivateKeyboardLayout
VerQueryValueA
waveOutGetPosition
midiInStart
OleConvertIStorageToOLESTREAM
Number of PE resources by type
RT_STRING 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
KOREAN 2
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.5.24.0

LanguageCode
Neutral

FileFlagsMask
0x0017

FileDescription
NexonMessenger Game Service

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x15ed

OriginalFileName
nmcogame.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2007 Nexon Corp.

FileVersion
2, 5, 24, 0

TimeStamp
2007:08:20 19:59:10-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
nmcogame

ProductVersion
2, 5, 24, 0

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nexon Corp.

CodeSize
8192

ProductName
NexonMessenger Game Service

ProductVersionNumber
2.5.24.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 c70aaf6f65cc4a20404eb90bf38073d0
SHA1 e6cf677322fa60f12a391e146b8b62cfe61af624
SHA256 7195110df7299e15378fbdf82ec0236004d93db3bcff277f5affec5abd99ccc9
ssdeep
3072:PSDzRORm5BN4J9MGZhLAtg0VkCVKa4r2goDiaEDdjfw:a34RmXuJThL+EC2oDiaExf

authentihash 859894a557144767c4f4b924de95fa90ea35b0daaaa122c745befe4d8b54d8ec
imphash 9beacb3176f01ae8e1683df15c7d718e
File size 136.0 KB ( 139264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-30 21:18:01 UTC ( 2 months, 2 weeks ago )
Last submission 2018-11-30 22:45:04 UTC ( 2 months, 2 weeks ago )
File names nmcogame.dll
ZLQb7bnHjCT6qYr9.exe
zbetcheckin_tracker_c70aaf6f65cc4a20404eb90bf38073d0
workdmi.exe
nmcogame
sbslime.exe
KT5zd4lKBLzE.exe
424.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!