rapportsetup.exe

Rapport Installer

Trusteer

Publisher:
Trusteer Ltd.  (signed by Trusteer)

Product:
Rapport Installer

Description:
RapportSetup

Version:
3.5.1304.70

MD5:
af4fc41f0498d68a902a004d878fb888

SHA-1:
c6fa6d46c4c1d4a2b22550a13f88d31b0c83aa42

SHA-256:
d5bdb7d942e3f2120e57d3f12c71008f8f324e09f60b7c188f8093e23f787447

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/25/2024 6:30:54 PM UTC  (today)

File size:
266.3 KB (272,664 bytes)

Product version:
3.5.1304.70

Copyright:
(c) Trusteer Ltd. All rights reserved.

Original file name:
RapportSetup

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\rapportsetup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/26/2013 5:30:00 AM

Valid to:
1/26/2016 5:29:59 AM

Subject:
CN=Trusteer, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Trusteer, L=Tel-Aviv, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
00FD4BF58299F091C827D4B51F2B83F0

File PE Metadata
Compilation timestamp:
4/14/2014 2:36:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:VM3NO2wcFYKfpzYZjizzqigqi+Yx7wjPjbZO:S3c2wcH9kuzqigqiAbE

Entry address:
0x12E52

Entry point:
E8, 78, 6E, 00, 00, E9, 16, FE, FF, FF, 55, 8B, EC, 83, EC, 08, 89, 7D, FC, 89, 75, F8, 8B, 75, 0C, 8B, 7D, 08, 8B, 4D, 10, C1, E9, 07, EB, 06, 8D, 9B, 00, 00, 00, 00, 66, 0F, 6F, 06, 66, 0F, 6F, 4E, 10, 66, 0F, 6F, 56, 20, 66, 0F, 6F, 5E, 30, 66, 0F, 7F, 07, 66, 0F, 7F, 4F, 10, 66, 0F, 7F, 57, 20, 66, 0F, 7F, 5F, 30, 66, 0F, 6F, 66, 40, 66, 0F, 6F, 6E, 50, 66, 0F, 6F, 76, 60, 66, 0F, 6F, 7E, 70, 66, 0F, 7F, 67, 40, 66, 0F, 7F, 6F, 50, 66, 0F, 7F, 77, 60, 66, 0F, 7F, 7F, 70, 8D, B6, 80, 00, 00, 00, 8D, BF...
 
[+]

Entropy:
6.3555

Code size:
140 KB (143,360 bytes)

The file rapportsetup.exe has been seen being distributed by the following URL.