sage100erptaxtableupdate2014q1.exe

Sage Software, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from cdn.dlm.na.sage.com.
Publisher:
Sage Software, Inc.  (signed and verified)

MD5:
e5807432d87e5b1fc7eb07e018d225ca

SHA-1:
9ec73e3d109dd311d6de429f59b1000aa47880fc

SHA-256:
218a1058d4bbb52a6effa023b1dd8a9fdf4674d07986303d14d4e7bc07f0682f

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 5:00:15 PM UTC  (today)

File size:
2.1 MB (2,242,864 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\sage100erptaxtableupdate2014q1.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/18/2012 8:00:00 PM

Valid to:
10/13/2015 7:59:59 PM

Subject:
CN="Sage Software, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Sage Software, Inc.", L=Norcross, S=Georgia, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
04FD2D09026BEED8FC7885BC2378C49B

File PE Metadata
Compilation timestamp:
11/2/2009 3:23:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
49152:9SWHeogFd8I8Ptvu8r68uZ9yYXJAEFYPNoPJjfQqU:DgFKI8Ptvrg9lXfBBfQr

Entry address:
0x14BDF

Entry point:
E8, 32, 67, 00, 00, E9, 17, FE, FF, FF, 3B, 0D, D8, D9, 42, 00, 75, 02, F3, C3, E9, B2, 67, 00, 00, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 58, 4C, 41, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 84, E6, 00, 00, 8B, 45, 0C, 8B, 40, 04, 83...
 
[+]

Entropy:
7.9446  (probably packed)

Code size:
148 KB (151,552 bytes)

The file sage100erptaxtableupdate2014q1.exe has been seen being distributed by the following URL.