extractor.exe

Research In Motion

This is a setup program which is used to install the application. The file has been seen being downloaded from content.rim.com.edgesuite.net.
Publisher:
Research In Motion  (signed and verified)

MD5:
6fd0d36c6dfaf83fc37cbabb8f8ae977

SHA-1:
eff371245a3017d96a92bd8c6cbf8fbcc14d5d0a

SHA-256:
b563abd89e1cc24552b6d5b3907fd8915a5886454391cf12ea0cabc2602c431c

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/2/2024 5:30:40 PM UTC  (today)

File size:
112 MB (117,454,168 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\research in motion\blackberry desktop\updates\a7227214-39be-46b4-8f87-42650b1c1046\extractor.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/8/2010 5:30:00 AM

Valid to:
6/11/2011 5:29:59 AM

Subject:
CN=Research In Motion, OU=Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Research In Motion, L=Waterloo, S=Ontario, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6EB37122E4EC99110CE114CCB597D223

File PE Metadata
Compilation timestamp:
7/23/2007 10:58:54 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
3145728:pA4iowuCxXq71W5MFqO64wC1FGcLUH+4XRD4:pAQwuC87E5bwGcf4XC

Entry address:
0x7698

Entry point:
E8, 19, 28, 00, 00, E9, 16, FE, FF, FF, 55, 8B, EC, 83, EC, 20, 53, 33, DB, 39, 5D, 10, 75, 20, E8, A4, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 35, 15, 00, 00, 83, C4, 14, 83, C8, FF, E9, 80, 00, 00, 00, 8B, 4D, 0C, 3B, CB, 56, 8B, 75, 08, 74, 21, 3B, F3, 75, 1D, E8, 75, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 06, 15, 00, 00, 83, C4, 14, 83, C8, FF, EB, 53, B8, FF, FF, FF, 7F, 3B, C8, 89, 45, E4, 77, 03, 89, 4D, E4, 57, FF, 75, 18, 8D, 45, E0, FF, 75, 14, C7, 45, EC...
 
[+]

Entropy:
7.9989  (probably packed)

Code size:
56 KB (57,344 bytes)

The file extractor.exe has been seen being distributed by the following URL.