w_turbotax_bpm_2015.010.0101.exe

INTUIT INC.

This is a setup program which is used to install the application. The file has been seen being downloaded from pesdld.shop.intuit.com.
Publisher:
INTUIT INC.  (signed and verified)

MD5:
967b53bbdf07d7fea08da6dbe90faf54

SHA-1:
c7a011fa0290501d1d5c96cc3c80276b2c2cbc93

SHA-256:
8f4c27c4393519a9a676f355d7a1846c6057abd8ca778a0be3e44decac37e19e

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 6:24:02 AM UTC  (today)

File size:
94.5 MB (99,140,672 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\w_turbotax_bpm_2015.010.0101.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
9/7/2015 5:00:00 PM

Valid to:
9/8/2017 4:59:59 PM

Subject:
CN=INTUIT INC., OU=CG DevOps, O=INTUIT INC., L=San Diego, S=California, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
5DF9B123C47AF63DE76EA953261C8E48

File PE Metadata
Compilation timestamp:
2/28/2008 5:53:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1572864:K1V4sJNYEhgsauru+bZ/Q6Z9SXtYzpMOUMC7D5jAVsQhtXvvBYzET6D0qn8r68xM:KxNYGgsSG/Q6Z9+YdMzThUsQ3XvtF8IU

Entry address:
0x5D654

Entry point:
55, 8B, EC, 6A, FF, 68, 38, 41, 47, 00, 68, A8, 1E, 46, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, D8, 00, 47, 00, 33, D2, 8A, D4, 89, 15, 08, A2, 49, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 04, A2, 49, 00, C1, E1, 08, 03, CA, 89, 0D, 00, A2, 49, 00, C1, E8, 10, A3, FC, A1, 49, 00, 33, F6, 56, E8, 8D, 47, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 58, 44, 00, 00, FF, 15, DC, 00, 47, 00, A3, 24, B9, 49, 00, E8...
 
[+]

Entropy:
7.9950

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
444 KB (454,656 bytes)

The file w_turbotax_bpm_2015.010.0101.exe has been seen being distributed by the following URL.