w_turbotax_bpm_2014.400.0101.exe

INTUIT INC.

This is a setup program which is used to install the application. The file has been seen being downloaded from pesdld.shop.intuit.com.
Publisher:
INTUIT INC.  (signed and verified)

MD5:
a3e92ec88998b05a16083ae729a0e423

SHA-1:
ad0ad7440b6f6ed208a2eb7e692de4328a2ffef4

SHA-256:
8630d938ce9f29c91553d8344dd55419edb815e3c05de37ecf48d13f0f172479

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 7:34:43 AM UTC  (today)

File size:
94.9 MB (99,546,848 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\w_turbotax_bpm_2014.400.0101.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
9/8/2014 8:00:00 PM

Valid to:
9/9/2016 7:59:59 PM

Subject:
CN=INTUIT INC., OU=CG Dev Ops - 2014, O=INTUIT INC., L=San Diego, S=California, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
5FB5B0B1454B3179E3D6463F776C25E7

File PE Metadata
Compilation timestamp:
2/28/2008 8:53:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1572864:skqzMzgiY8IIPc8XXx/1F11CNg9kR2Vc9NAO6sPZIMt9bGLMJqAHhxiC73BSc0Pw:sigitLc8XBf1159FV4N6uIk9brJqABxx

Entry address:
0x5D654

Entry point:
55, 8B, EC, 6A, FF, 68, 38, 41, 47, 00, 68, A8, 1E, 46, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, D8, 00, 47, 00, 33, D2, 8A, D4, 89, 15, 08, A2, 49, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 04, A2, 49, 00, C1, E1, 08, 03, CA, 89, 0D, 00, A2, 49, 00, C1, E8, 10, A3, FC, A1, 49, 00, 33, F6, 56, E8, 8D, 47, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 58, 44, 00, 00, FF, 15, DC, 00, 47, 00, A3, 24, B9, 49, 00, E8...
 
[+]

Entropy:
7.9954

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
444 KB (454,656 bytes)

The file w_turbotax_bpm_2014.400.0101.exe has been seen being distributed by the following URL.