w_turbotax_1040_dlx_2013.060.0100.exe

INTUIT INC.

This is a setup program which is used to install the application. The file has been seen being downloaded from pesdld.shop.intuit.com.
Publisher:
INTUIT INC.  (signed and verified)

MD5:
20d02b064dfb76a7031749ce6868baa4

SHA-1:
361afa9b727452ad26fbc51aba9c41a32e07e902

SHA-256:
de0daf8f5ceab2d3d3d0e2685f17626064d7750564ffffdc1ecbf1c6c29dc134

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 12:28:57 AM UTC  (today)

File size:
90 MB (94,341,104 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/19/2013 8:00:00 PM

Valid to:
8/21/2014 7:59:59 PM

Subject:
CN=INTUIT INC., OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=CG DevOps, O=INTUIT INC., L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
098F1CB1D84AAD2760D5425F16D64BB7

File PE Metadata
Compilation timestamp:
2/28/2008 8:53:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1572864:NSG1IiQ8/w6jSNKgUiiTj1koSILTbQSDc6WHjM3ZYPKSO2/xiC73CVJr/TNF55:NSGiwnaFUdlkFILvQYqMZjixiC73WzD5

Entry address:
0x5D654

Entry point:
55, 8B, EC, 6A, FF, 68, 38, 41, 47, 00, 68, A8, 1E, 46, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, D8, 00, 47, 00, 33, D2, 8A, D4, 89, 15, 08, A2, 49, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 04, A2, 49, 00, C1, E1, 08, 03, CA, 89, 0D, 00, A2, 49, 00, C1, E8, 10, A3, FC, A1, 49, 00, 33, F6, 56, E8, 8D, 47, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 58, 44, 00, 00, FF, 15, DC, 00, 47, 00, A3, 24, B9, 49, 00, E8...
 
[+]

Entropy:
7.9908

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
444 KB (454,656 bytes)

The file w_turbotax_1040_dlx_2013.060.0100.exe has been seen being distributed by the following URL.