au.exe

Ace Optimizer Utilities

Acelogix Software

Publisher:
Acelogix Software  (signed and verified)

Product:
Ace Optimizer Utilities

Description:
Acelogix Software's Ace Utilities For System Maintenance

Version:
4, 0, 0, 4050

MD5:
590d8fc08a223bdf75006223c200e36c

SHA-1:
be37e960613df010ccd213efb2852e7b48d9502f

SHA-256:
38ceb54c1d03256cfa8db635f2407d72162d2e9d77c70d5a7e11d3391582e7be

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/19/2024 11:53:26 PM UTC  (a few moments ago)

File size:
2.5 MB (2,654,920 bytes)

Product version:
4, 0, 0, 4050

Copyright:
Copyright (C) 2002 - 2007

Trademarks:
None

Original file name:
au.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ace utilities\au.exe

Digital Signature
Authority:
Thawte Consulting (Pty) Ltd.

Valid from:
12/27/2006 5:30:00 AM

Valid to:
12/28/2007 5:29:59 AM

Subject:
CN=Acelogix Software, OU=Secure Application Development, O=Acelogix Software, L=Trivandrum, S=Kerala, C=IN

Issuer:
CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA

Serial number:
269524D040C9767291E132952E603D28

File PE Metadata
Compilation timestamp:
8/25/2007 11:54:44 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
83.82

CTPH (ssdeep):
49152:QTcTAoTX5sTCWsQTgHEy3nOxQWu2HKS5hL7SoDPJF:zZXQ0Hl3OxQWnqIXPJF

Entry address:
0x2C9DA0

Entry point:
48, 83, EC, 28, E8, 67, 6A, FF, FF, 48, 83, C4, 28, E9, FE, FC, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 48, 83, EC, 28, 48, 83, F9, E0, 48, 89, 5C, 24, 38, 48, 8B, D9, 0F, 87, 9C, 00, 00, 00, 48, 89, 74, 24, 40, 48, 85, C9, BE, 01, 00, 00, 00, 48, 0F, 45, F1, 48, 89, 7C, 24, 48, 66, 66, 66, 90, 48, 8B, 0D, 49, 80, 03, 00, 48, 85, C9, 75, 20, E8, 7F, 21, 00, 00, B9, 1E, 00, 00, 00, E8, 35, 1F, 00, 00, B9, FF, 00, 00, 00, E8, DB, D9, FF, FF, 48, 8B, 0D, 24, 80, 03, 00, 4C, 8B, C6, 33...
 
[+]

Entropy:
6.9051

Code size:
148 KB (151,552 bytes)

Scan au.exe - Powered by Reason Core Security