ddohigh.exe

Turbine, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from cl.s6.exct.net.
Publisher:
Turbine, Inc.  (signed and verified)

MD5:
6737f2e56f2109c892e7e49d06abddb0

SHA-1:
dd9aec851c0704fd43f129dfd6f1ea2bd6b08c69

SHA-256:
79459b23854388b5130efe8deb5153383a9bd914df49772c017f6885ff17fa54

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/30/2024 12:45:27 AM UTC  (today)

File size:
2.3 MB (2,374,552 bytes)

File type:
Executable application (Win64 EXE)

Common path:
C:\users\{user}\downloads\ddohigh.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/19/2011 1:00:00 AM

Valid to:
7/20/2014 12:59:59 AM

Subject:
CN="Turbine, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Turbine, Inc.", S=Massachusetts, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2888668C05AC8F535A1C2490EFE60F9B

File PE Metadata
Compilation timestamp:
5/10/2012 5:30:41 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
49152:dXQsVS3OTckn5TEdrrW/fQteMSY/nmaAJnWCzoza5MRSnr+:gkJorK/pMSYvmaAUI/5Mu+

Entry address:
0x6DC7E0

Entry point:
4D, 5A, 90, 00, 03, 00, 00, 00, 04, 00, 00, 00, FF, FF, 00, 00, B8, 00, 00, 00, 00, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 80, 00, 00, 00, 0E, 1F, BA, 0E, 00, B4, 09, CD, 21, B8, 01, 4C, CD, 21, 54, 68, 69, 73, 20, 70, 72, 6F, 67, 72, 61, 6D, 20, 63, 61, 6E, 6E, 6F, 74, 20, 62, 65, 20, 72, 75, 6E, 20, 69, 6E, 20, 44, 4F, 53, 20, 6D, 6F, 64, 65, 2E, 0D, 0D, 0A, 24, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9178  (probably packed)

Code size:
2.3 MB (2,363,392 bytes)

The file ddohigh.exe has been seen being distributed by the following URL.

Scan ddohigh.exe - Powered by Reason Core Security