setup.exe

NexonJapan Plugin

NEXON Korea Corporation.

Publisher:
NEXON  (signed by NEXON Korea Corporation.)

Product:
NexonJapan Plugin

Version:
1.0.0.1

MD5:
88acccda32b5dbb8775eb8f7da534d53

SHA-1:
8481b238de00bf4caca2c1097ed436bc374deee8

SHA-256:
1ad9ce0e1a9e6a269af1af656d3151bc96eed6d3425bb65a419f35736ef792f9

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/8/2024 7:51:08 PM UTC  (today)

File size:
1.7 MB (1,758,552 bytes)

Product version:
1.0.0.1

Copyright:
Copyright ⓒ NEXON Co., Ltd All rights reserved.

Original file name:
Plugin.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/16/2013 9:00:00 AM

Valid to:
1/17/2016 8:59:59 AM

Subject:
CN=NEXON Korea Corporation., OU=IT engineering Team, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=NEXON Korea Corporation., L=Gangnam-gu, S=Seoul, C=KR

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1471D2BA4957C042096673E3D3B47932

File PE Metadata
Compilation timestamp:
6/17/2014 3:53:25 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:19yJRhQSok0ZTxYbtwUgKb0TtQyxydOoMPNUnU2W5z6ZE8OaPCR1rS:q3hQSoTZKt+KmtQyxydOoM1UNELaPCR1

Entry address:
0x1064B0

Entry point:
E8, 83, 79, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, F0, 9D, 57, 00, 75, 02, F3, C3, E9, 0A, 7A, 00, 00, 8B, FF, 55, 8B, EC, 8B, 4D, 10, 85, C9, 74, 1B, 8B, 45, 0C, 0F, B7, D0, 8B, C2, C1, E2, 10, 57, 8B, 7D, 08, 0B, C2, D1, E9, F3, AB, 13, C9, 66, F3, AB, 5F, 8B, 45, 08, 5D, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 64, 83, 7D, 08, 00, 75, 13, E8, B9, 14, 00, 00, 6A, 16, 5E, 89, 30, E8, 48, 7C, 00, 00, 8B, C6, EB, 4B, 83, 7D, 10, 00, 74, 19, 39, 75, 0C, 72, 14, 8D, 04, 36, 50, FF, 75...
 
[+]

Entropy:
6.3917

Code size:
1.2 MB (1,225,216 bytes)

The file setup.exe has been seen being distributed by the following URL.

Scan setup.exe - Powered by Reason Core Security