pg.exe

Prokon Software Consultants

This is installed with Prokon.
Publisher:
Prokon Software Consultants  (signed and verified)

Version:
2.5.0.0

MD5:
bd32d0edf2781e705bfec64e9be631b5

SHA-1:
4bd02ed7cec39a0ff43ce7e78e8d659d8997377c

SHA-256:
1ff45bcbaeba24f5a080073269d40f409fd5beaf2399fcf64005387305d487f3

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/25/2024 10:40:40 AM UTC  (today)

File size:
1.5 MB (1,557,672 bytes)

Product version:
2.5.0.0

File type:
Executable application (Win32 EXE)

Language:
English (South Africa)

Digital Signature
Authority:
Thawte Consulting (Pty) Ltd.

Valid from:
6/3/2010 4:00:00 AM

Valid to:
2/12/2012 3:59:59 AM

Subject:
CN=Prokon Software Consultants, OU=Developer, O=Prokon Software Consultants, L=Pretoria, S=Gauteng, C=ZA

Issuer:
CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA

Serial number:
7EFFF2E7455CA63BFDA94C81CFCAEB8D

File PE Metadata
Compilation timestamp:
7/6/2010 12:53:25 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:14mZHTC2X2UwnL10McdBzXicdjiV3jCmeAmHoJ3w5hsacuJ+TQcw90zN6PMz5:ukX2qGcdjiFCBAmIF2hsacuJwc90zwQ

Entry address:
0x56DF00

Entry point:
60, BE, 00, 20, 80, 00, 8D, BE, 00, F0, BF, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.9009

Packer / compiler:
UPX 2.90LZMA

Code size:
1.4 MB (1,495,040 bytes)

The file pg.exe has been discovered within the following program.

Prokon  by Prokon Software Consultants
www.prokon.com
About 4% of users remove it
 
Powered by Should I Remove It?

Scan pg.exe - Powered by Reason Core Security