qtinstaller.exe

Apple Computer, Inc.

This is a self-extracting archive and installer. The file has been seen being downloaded from qtinstall.info.apple.com.
Publisher:
Apple Computer, Inc.  (signed and verified)

MD5:
2a21ca4c3f9ac7a1a17a7b11419c8d3f

SHA-1:
133d5066a1cc7b4311a3187e590321918b99bc7e

SHA-256:
c15a2067fe2cb5017dbfde3cfe573caae8b28b9d5eb1ad1f6a01a6a838914815

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 1:49:48 PM UTC  (today)

File size:
12.3 MB (12,862,632 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/15/2004 8:00:00 AM

Valid to:
1/17/2005 7:59:59 AM

Subject:
CN="Apple Computer, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Apple Computer, Inc.", L=Cupertino, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2001 CA, OU=Terms of use at https://www.verisign.com/rpa (c)01, OU=VeriSign Trust Network, O="VeriSign, Inc."

Serial number:
3BF7367956A31B42145284829D5D9AA6

File PE Metadata
Compilation timestamp:
2/4/1999 1:43:25 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:Xl3IrhkZiT54YxgRWahR3nEK43GSFByeUsOK:13oEYCYcDUK43G1eUsOK

Entry address:
0x62A0

Entry point:
55, 8B, EC, 6A, FF, 68, 90, D1, 40, 00, 68, 70, 82, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, CC, D0, 40, 00, 33, D2, 8A, D4, 89, 15, 78, F2, 40, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 74, F2, 40, 00, C1, E1, 08, 03, CA, 89, 0D, 70, F2, 40, 00, C1, E8, 10, A3, 6C, F2, 40, 00, 33, F6, 56, E8, 3C, 1E, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 7C, 1C, 00, 00, FF, 15, C8, D0, 40, 00, A3, 08, FA, 40, 00, E8...
 
[+]

Entropy:
7.9974

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
48 KB (49,152 bytes)

The file qtinstaller.exe has been seen being distributed by the following URL.