TweakManager.exe file report

MD5 9217a8077767c7af91fba493c45236ee
Latest seen 2024-06-24 23:03:18 (2 years ago)
First seen 2018-06-15 13:13:07 (7 years ago)
Size 1 MB
Publisher Aus˜logics
Product Boo˜stSpeed

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2018-06-15 13:13:07 (7 years ago); latest analysis 2024-06-24 23:03:18 (2 years ago).

Publisher context

Company metadata: Aus˜logics. Product metadata: Boo˜stSpeed.

Digital signature

Signed by Auslogics Labs Pty Ltd. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

TweakManager.exe is a Windows file recorded in the ThreatInfo database. It is associated with Boo˜stSpeed. The reported company name is Aus˜logics. The current detection status is Undefined, based on the latest analysis from 2024-06-24 23:03:18 (2 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Boo˜stSpeed
Company Name: Aus˜logics
MD5: 9217a8077767c7af91fba493c45236ee
Size: 1 MB
First Published: 2018-06-15 13:13:07 (7 years ago)
Latest Published: 2024-06-24 23:03:18 (2 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2024-06-24 23:03:18 (2 years ago)
Signed By: Auslogics Labs Pty Ltd
Status: Valid

The signature on TweakManager.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\auslogics
%desktop%\телеф\новая папка\auslogics boostspeed\app
%programfiles%\auslogics\app
%programfiles%
%desktop%\programme\auslogics.boostspeed.10.0.12.portable.karanpc\app
%desktop%\auslogics boostspeed\app
%profile%\downloads\торренты\auslogics boostspeed 10.0.12.0 repack (@amp; portable) by tryroom\auslogicsboostspeedportable\app
%sysdrive%\progra~1\auslogics
%programfiles%\auslogicsboostspeed\auslogics boostspeedportable\app
%desktop%\auslogics.boostspeed.10.0.12.portable\app

ThreatInfo has observed TweakManager.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

30.4%
13.5%
8.9%
6.1%
4.0%
3.7%
3.1%
2.8%
2.8%
2.8%
2.1%
2.1%
1.5%
1.5%
0.9%
0.9%
0.9%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%
0.3%

The strongest geographic signal for this file is Russian Federation with 30.4% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 63.3%
Windows 7 22.3%
Windows 8.1 13.5%
Windows XP 0.6%
Windows Embedded Standard 0.3%

The most common operating system signal for TweakManager.exe is Windows 10 with 63.3% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

TweakManager.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x000e61b4

PE Sections:

Name Size of data MD5
.text 932864 a5e0f2de147b1c279a82176b339b18b2
.itext 5120 f5fd8f77d7c990207b03a6128643e270
.data 18432 2046124b93de2e6cfbc312eea1a69c32
.bss 0 00000000000000000000000000000000
.idata 92160 b2742c1749ff7993318a22eae97a6073
.didata 512 57087052502d70e438846e492ea30f05
.edata 512 86944d84048677e2a3e2d00fe347d67a
.tls 0 00000000000000000000000000000000
.rdata 512 c2de50369cd26e4b22042dd02e709f6e
.rsrc 461312 cf8ce817498bfd83929a3bb3b25ebe09
.xdata 64000 53e44e3a8648630b1cdf8dd55950419d

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: