× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9121c9a61af17cb70a177d1fa3deb887c110c53d0382c6fdb7f4d48d00aff771
File name: 9121c9a61af17cb70a177d1fa3deb887c110c53d0382c6fdb7f4d48d00aff771
Detection ratio: 49 / 69
Analysis date: 2018-12-06 01:33:52 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31390004 20181206
AegisLab Trojan.Win32.Emotet.4!c 20181206
AhnLab-V3 Trojan/Win32.Banki.R247004 20181205
ALYac Trojan.Autoruns.GenericKDS.31390004 20181205
Arcabit Trojan.Autoruns.GenericS.D1DEF934 20181205
Avast Win32:BankerX-gen [Trj] 20181205
AVG Win32:BankerX-gen [Trj] 20181205
BitDefender Trojan.Autoruns.GenericKDS.31390004 20181205
CAT-QuickHeal Trojan.Emotet 20181205
ClamAV Win.Malware.Emotet-6766201-0 20181205
Comodo Malware@#2p0eabsyj11ic 20181205
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.14a27e 20180225
Cylance Unsafe 20181206
Cyren W32/Emotet.JZ.gen!Eldorado 20181205
Emsisoft Trojan.Autoruns.GenericKDS.31390004 (B) 20181205
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNLL 20181205
F-Prot W32/Emotet.JZ.gen!Eldorado 20181205
F-Secure Trojan.Autoruns.GenericKDS.31390004 20181205
Fortinet Malicious_Behavior.SB 20181205
GData Trojan.Autoruns.GenericKDS.31390004 20181205
Ikarus Trojan-Banker.Emotet 20181205
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0053b6a31 ) 20181205
K7GW Trojan ( 0054286f1 ) 20181205
Kaspersky Trojan-Banker.Win32.Emotet.bsuc 20181205
Malwarebytes Trojan.Emotet 20181205
MAX malware (ai score=100) 20181206
McAfee RDN/Generic.grp 20181205
McAfee-GW-Edition BehavesLike.Win32.Virut.ch 20181205
Microsoft Trojan:Win32/Emotet.BE 20181205
eScan Trojan.Autoruns.GenericKDS.31390004 20181205
NANO-Antivirus Trojan.Win32.Emotet.fkuzen 20181205
Palo Alto Networks (Known Signatures) generic.ml 20181206
Panda Trj/GdSda.A 20181205
Qihoo-360 HEUR/QVM20.1.8E67.Malware.Gen 20181206
Rising Trojan.Emotet!8.B95 (CLOUD) 20181205
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-AOF 20181205
Symantec Trojan.Emotet 20181205
Tencent Win32.Trojan-banker.Emotet.Dzju 20181206
Trapmine malicious.high.ml.score 20181205
TrendMicro TSPY_EMOTET.THABOCAH 20181206
TrendMicro-HouseCall TSPY_EMOTET.THABOCAH 20181206
VBA32 Trojan.Emotet 20181205
ViRobot Trojan.Win32.Z.Emotet.139264.DK 20181206
Webroot W32.Trojan.Emotet 20181206
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bsuc 20181206
Alibaba 20180921
Antiy-AVL 20181205
Avast-Mobile 20181205
Avira (no cloud) 20181205
Babable 20180918
Baidu 20181205
Bkav 20181205
CMC 20181205
DrWeb 20181205
eGambit 20181206
Jiangmin 20181205
Kingsoft 20181206
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TACHYON 20181205
TheHacker 20181202
TotalDefense 20181206
Trustlook 20181206
Yandex 20181204
Zillya 20181206
Zoner 20181206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2007 Nexon Corp.

Product NexonMessenger Game Service
Original name nmcogame.dll
Internal name nmcogame
File version 2, 5, 24, 0
Description NexonMessenger Game Service
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-08-21 02:59:10
Entry Point 0x0000162B
Number of sections 7
PE sections
PE imports
RegCloseKey
RegEnumValueW
RegSetKeySecurity
JetPrepareUpdate
GetViewportExtEx
GetLargePageMinimum
GetFileSize
CreateFileW
GetCommandLineW
GetSystemDefaultLCID
PulseEvent
DeleteAtom
GetFileType
FindNextFileA
GetUserDefaultLCID
SetMailslotInfo
SafeArrayCreate
NdrAllocate
CountClipboardFormats
GetLastActivePopup
DdeConnectList
GetPhysicalCursorPos
GetWindowInfo
ActivateKeyboardLayout
VerQueryValueA
waveOutGetPosition
midiInStart
OleConvertIStorageToOLESTREAM
Number of PE resources by type
RT_STRING 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
KOREAN 2
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.5.24.0

LanguageCode
Neutral

FileFlagsMask
0x0017

FileDescription
NexonMessenger Game Service

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x162b

OriginalFileName
nmcogame.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2007 Nexon Corp.

FileVersion
2, 5, 24, 0

TimeStamp
2007:08:20 19:59:10-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
nmcogame

ProductVersion
2, 5, 24, 0

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nexon Corp.

CodeSize
8192

ProductName
NexonMessenger Game Service

ProductVersionNumber
2.5.24.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 855a2f114a27e0fc4998ee38457b539a
SHA1 a1df078088c365f227512c6c8d0b7711ae68d530
SHA256 9121c9a61af17cb70a177d1fa3deb887c110c53d0382c6fdb7f4d48d00aff771
ssdeep
3072:4dGqlzjqV0wRkdL8bNe7hUic1o6OByhy3u6:4rgvgLwwGaBD

authentihash 3f779629868116cc3e22d129470ef74a4449f1e992d1ccd99f21a0a82bf44b0a
imphash 1d2afb645c571303ca578c9ba021ec71
File size 136.0 KB ( 139264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-30 16:50:24 UTC ( 2 months, 3 weeks ago )
Last submission 2018-12-03 22:49:28 UTC ( 2 months, 2 weeks ago )
File names nmcogame.dll
23849432.exe
466.exe
nmcogame
LFaYjzlcN.exe
qUWNgPxzd.exe
bV8scxK6V.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!