lookeen.8.2.2.5088.exe

Lookeen Search

Axonic Informationssysteme GmbH

The program is a setup application that uses the Inno Setup installer.
Publisher:
Axonic GmbH   (signed by Axonic Informationssysteme GmbH)

Product:
Lookeen Search

Description:
Lookeen Setup

MD5:
4be7e35fbe6c542d91b4b8716c685a64

SHA-1:
6ba28699665d92cb3517411bdc6c5ddef3dc2d6e

SHA-256:
d79139dd1bc5976f558e7edeb8036469623469ae2ddb9dc8988e6e9c68ce47fe

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/27/2024 8:50:53 PM UTC  (today)

File size:
10.7 MB (11,198,088 bytes)

Product version:
8.2.2.5088

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Digital Signature
Authority:
Thawte, Inc.

Valid from:
3/14/2012 1:00:00 AM

Valid to:
4/20/2014 1:59:59 AM

Subject:
CN=Axonic Informationssysteme GmbH, OU=APPLICATION DEVELOPMENT, O=Axonic Informationssysteme GmbH, L=Karlsruhe, S=Baden-Wuerttemberg, C=DE

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
00DDB3A010F1942E014102653DE2D0DE

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
196608:fg70QGaaMFRi3ESDj1QG+E4mbCG4hUDYiLOyl/g0t35CJF6uLnNPbE2nGUw7ml:GGBcRQE6LNbCfgtgC5C20NP4g

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.9993

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

Scan lookeen.8.2.2.5088.exe - Powered by Reason Core Security