raidcall_7.3.6.exe

RAIDCALL LIMITED.

This is a setup program which is used to install the application. The file has been seen being downloaded from dc543.4shared.com and multiple other hosts.
Publisher:
RAIDCALL LIMITED.  (signed and verified)

MD5:
181051795fc45ada57442d6047f226a9

SHA-1:
29a022dd3e5341620c6699cc054efd9a01759347

SHA-256:
70bb9d2fba0829fca247c9cbb5a87c33aa11c08dc0dcac9ca3282771b17befe6

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/24/2024 6:58:58 PM UTC  (today)

File size:
5.5 MB (5,739,736 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\raidcall_7.3.6.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/21/2014 10:00:00 PM

Valid to:
1/22/2015 9:59:59 PM

Subject:
CN=RAIDCALL LIMITED., OU=TECH DEPT., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=RAIDCALL LIMITED., L=BEIJING, S=BEIJING, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
69EF9F7D27C07142D9046D9C43F00324

File PE Metadata
Compilation timestamp:
3/21/2010 9:59:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:BdSQPQYWrdUpBdDoa0XVEDd1K5+9JwwZgj7A+tuyz+hLjfAxz2vqfa0AWmh+:BdpMRUpBdklov9JwwCtuwezAxK0a0Ad+

Entry address:
0x114F

Entry point:
E9, EC, 56, 00, 00, E9, 27, 96, 00, 00, E9, 72, 9A, 00, 00, E9, CD, 95, 00, 00, E9, E8, AA, 00, 00, E9, C3, BA, 00, 00, E9, 5E, 9B, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC...
 
[+]

Packer / compiler:
Xtreme-Protector v1.05

Code size:
57.5 KB (58,880 bytes)

The file raidcall_7.3.6.exe has been seen being distributed by the following 4 URLs.

Scan raidcall_7.3.6.exe - Powered by Reason Core Security