um2.tmp

NEOWIZ GAMES CORP.

Publisher:
NEOWIZ GAMES CORP.  (signed and verified)

MD5:
4fdb1fb5e5a94a0573a6527d33784a4b

SHA-1:
eac3f6c5135deda5f164b2caeede8cd44e6622e4

SHA-256:
67a7446fd41ebfd057b482d9c2bf99e3a4f3584ca5578fdca48140a2e3ff317b

Scanner detections:
1 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
12/26/2024 3:10:36 AM UTC  (today)

Scan engine
Detection
Engine version

Kaspersky
HEUR:Trojan-Downloader.Win32.Generic
14.0.0.169

File size:
3.3 MB (3,512,712 bytes)

Common path:
C:\users\{user}\appdata\local\temp\um2.tmp

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/27/2015 9:00:00 AM

Valid to:
11/26/2016 8:59:59 AM

Subject:
CN=NEOWIZ GAMES CORP., O=NEOWIZ GAMES CORP., L=Seongnam-si, S=Gyeonggi-do, C=KR

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5D7B998086DC11B91B95CD83EE44B344

File PE Metadata
Compilation timestamp:
4/10/2009 11:07:43 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

CTPH (ssdeep):
98304:5LSbT+7yTJweC+yH3SI9LVkKxI8ih8bX4G1M5M:5LSX+7wuHj9iK5ih8bIG1oM

Entry address:
0x74A6

Entry point:
6A, 60, 68, 00, D5, 40, 00, E8, 7E, 03, 00, 00, BF, 94, 00, 00, 00, 8B, C7, E8, 42, 24, 00, 00, 89, 65, E8, 8B, F4, 89, 3E, 56, FF, 15, EC, D0, 40, 00, 8B, 4E, 10, 89, 0D, 90, 0C, 41, 00, 8B, 46, 04, A3, 9C, 0C, 41, 00, 8B, 56, 08, 89, 15, A0, 0C, 41, 00, 8B, 76, 0C, 81, E6, FF, 7F, 00, 00, 89, 35, 94, 0C, 41, 00, 83, F9, 02, 74, 0C, 81, CE, 00, 80, 00, 00, 89, 35, 94, 0C, 41, 00, C1, E0, 08, 03, C2, A3, 98, 0C, 41, 00, 33, F6, 56, 8B, 3D, 58, D0, 40, 00, FF, D7, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03...
 
[+]

Entropy:
7.9673

Developed / compiled with:
Microsoft Visual C++ v7.0

Code size:
48 KB (49,152 bytes)

The file um2.tmp has been seen being distributed by the following URL.

Scan um2.tmp - Powered by Reason Core Security