raidcallv7.3.6.exe

Setup

Dey yazilim ve internet hizmetleri san. tic. ltd. sti.

The application raidcallv7.3.6.exe, “WesternDigital Setup” by Dey yazilim ve internet hizmetleri san. tic. ltd. sti has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software.
Publisher:
WesternDigital  (signed by Dey yazilim ve internet hizmetleri san. tic. ltd. sti.)

Product:
Setup

Description:
WesternDigital Setup

Version:
1.1.2.0

MD5:
8ba042ae6c91da98beba8bc14fa6ac5b

SHA-1:
7e0af1c3349b46c3948090f33e53860cd33781cd

SHA-256:
2a8db73a18539c33b82d8746e694fef8f0c5ba6e45cd5348b09c816865a9f95d

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/23/2024 10:09:42 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Amonitize.Deyyazil.Installer (M)
16.4.30.0

File size:
465.7 KB (476,888 bytes)

Product version:
1.1.2.0

Copyright:
WesternDigital

Trademarks:
WesternDigital

Original file name:
WesternDigital.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\raidcallv7.3.6.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/12/2014 3:00:00 AM

Valid to:
3/13/2015 2:59:59 AM

Subject:
CN=Dey yazilim ve internet hizmetleri san. tic. ltd. sti., O=Dey yazilim ve internet hizmetleri san. tic. ltd. sti., STREET=kuloglu mah alyon gecidi sok, STREET=beyoglu, L=istanbul, S=istanbul, PostalCode=34433, C=TR

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00FD3AA42CD883A6D47CC56CDA9837EB85

File PE Metadata
Compilation timestamp:
3/7/2015 11:52:30 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:9LS/J1s0ldUmx/bLbYnwch3SoMGsgL7GZOsLa30hTbYSBYUZ:9LS/J1sGdUmx/bwnwcco/nGZY09r

Entry address:
0x6387E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
390.5 KB (399,872 bytes)

Remove raidcallv7.3.6.exe - Powered by Reason Core Security