raidcall_7.3.6.exe

RAIDCALL LIMITED.

This is a setup program which is used to install the application. The file has been seen being downloaded from update.raidcall.com and multiple other hosts.
Publisher:
RAIDCALL LIMITED.  (signed and verified)

MD5:
a0b6bbd6ccd89a50a4e16c24bb7585d6

SHA-1:
d219e55f845c87d344058c9aa9f649034c8fe9f9

SHA-256:
54523f22a16577f0610b1833653917cc70606ec77febb3395d1ea343c26e7dad

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/28/2024 12:31:20 AM UTC  (today)

File size:
5.5 MB (5,729,888 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\raidcall_7.3.6.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/21/2014 8:00:00 PM

Valid to:
1/22/2015 7:59:59 PM

Subject:
CN=RAIDCALL LIMITED., OU=TECH DEPT., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=RAIDCALL LIMITED., L=BEIJING, S=BEIJING, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
69EF9F7D27C07142D9046D9C43F00324

File PE Metadata
Compilation timestamp:
3/21/2010 8:59:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:zIR19+dKl37ptiv7eynfu7jMshpUl3POnUa8Buafaw4vDhZh9:E5vltiDeynfIhmlaEBdfsPh9

Entry address:
0x114F

Entry point:
E9, EC, 56, 00, 00, E9, 27, 96, 00, 00, E9, 72, 9A, 00, 00, E9, CD, 95, 00, 00, E9, E8, AA, 00, 00, E9, C3, BA, 00, 00, E9, 5E, 9B, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC...
 
[+]

Entropy:
7.9964

Packer / compiler:
Xtreme-Protector v1.05

Code size:
57.5 KB (58,880 bytes)

The file raidcall_7.3.6.exe has been seen being distributed by the following 3 URLs.

Scan raidcall_7.3.6.exe - Powered by Reason Core Security