sagetimeslips2014b.exe

Sage Software, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from cdn.dlm.na.sage.com.
Publisher:
Sage Software, Inc.  (signed and verified)

MD5:
c2c47bb04e07e145cf6c13023338874b

SHA-1:
00da31023b4496f2c77a8338efcc60a0855e3889

SHA-256:
71a6ddee73935b498b70735a7089c0c31e7a2bb72e72d90e9f963b0fb51dc400

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 7:22:49 PM UTC  (today)

File size:
160.7 MB (168,487,216 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\sagetimeslips2014b.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/18/2012 8:00:00 PM

Valid to:
10/13/2015 7:59:59 PM

Subject:
CN="Sage Software, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Sage Software, Inc.", L=Norcross, S=Georgia, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
04FD2D09026BEED8FC7885BC2378C49B

File PE Metadata
Compilation timestamp:
11/2/2009 3:24:29 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
3145728:jyYfxmZCfm5zI+iK2BSlE0OURYku17H5hSUI9p4EqG0XtIezC1ag7CbnSp:jyYf4Z0GcI20p3UorfAA8Phb

Entry address:
0x1479F

Entry point:
E8, 02, 67, 00, 00, E9, 17, FE, FF, FF, 3B, 0D, D8, C9, 42, 00, 75, 02, F3, C3, E9, 82, 67, 00, 00, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 18, 48, 41, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 54, E6, 00, 00, 8B, 45, 0C, 8B, 40, 04, 83...
 
[+]

Entropy:
7.9997  (probably packed)

Code size:
144 KB (147,456 bytes)

The file sagetimeslips2014b.exe has been seen being distributed by the following URL.