wturbotaxbpmar20130100100.exe

INTUIT INC.

This is a setup program which is used to install the application. The file has been seen being downloaded from quicksof.com.
Publisher:
INTUIT INC.  (signed and verified)

MD5:
df377ee17b74730b7c540bc4d732afd4

SHA-1:
4e3573ff8b4eb63c56da48dc7d876176c030a74c

SHA-256:
08801526c34ed98df0a4669cde6e0894d5bfa89724a8ad95652826b39d0971fb

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/24/2024 4:31:22 PM UTC  (today)

File size:
73 MB (76,550,272 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/19/2013 8:00:00 PM

Valid to:
8/21/2014 7:59:59 PM

Subject:
CN=INTUIT INC., OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=CG DevOps, O=INTUIT INC., L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
098F1CB1D84AAD2760D5425F16D64BB7

File PE Metadata
Compilation timestamp:
2/28/2008 8:53:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1572864:OhIOiKP55qeW8fxutI77/s1LTEvtPWi/Sz9bzKqpmsDzDKQz8uxiC73bc:Oziq/e8fxL3sFEVPW11zKXiz8uxiC734

Entry address:
0x5D654

Entry point:
55, 8B, EC, 6A, FF, 68, 38, 41, 47, 00, 68, A8, 1E, 46, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, D8, 00, 47, 00, 33, D2, 8A, D4, 89, 15, 08, A2, 49, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 04, A2, 49, 00, C1, E1, 08, 03, CA, 89, 0D, 00, A2, 49, 00, C1, E8, 10, A3, FC, A1, 49, 00, 33, F6, 56, E8, 8D, 47, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 58, 44, 00, 00, FF, 15, DC, 00, 47, 00, A3, 24, B9, 49, 00, E8...
 
[+]

Entropy:
7.9891

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
444 KB (454,656 bytes)

The file wturbotaxbpmar20130100100.exe has been seen being distributed by the following URL.