crestron_toolbox_2.42.703.00.exe

Crestron Toolbox

Crestron Electronics, Inc

This is a setup and installation application.
Publisher:
Crestron Electronics Inc.   (signed by Crestron Electronics, Inc)

Product:
Crestron Toolbox

Description:
Crestron Toolbox version 2.42.703.00 Setup

Version:
2.42.703.00

MD5:
0e348c27384203f6375134d1e3538532

SHA-1:
9dd5d3d1443391ebf1cc342fff0e6705dc68e795

SHA-256:
34f5c0f7ee4b4535267d9eadf298cb58c192bde5db43d0a3570d50a8163b467f

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 9:11:24 AM UTC  (today)

File size:
90 MB (94,389,968 bytes)

Product version:
2.42.703.00

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\crestron\downloads\crestron_toolbox_2.42.703.00.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
3/6/2016 7:00:00 PM

Valid to:
4/12/2017 7:59:59 PM

Subject:
CN="Crestron Electronics, Inc", O="Crestron Electronics, Inc", L=Rockleigh, S=New Jersey, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
37D1DB835FA4AC5723C03FA013D3A262

File PE Metadata
Compilation timestamp:
4/6/2016 10:39:04 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x117DC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 44, 01, 41, 00, E8, C8, 4D, FF, FF, 33, C0, 55, 68, BE, 1E, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 7A, 1E, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 0E, D5, FF, FF, E8, 5D, D0, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 23, D6, FF, FF, 33, C0, E8, 60, 2E, FF, FF, 8D, 55, EC, 33, C0, E8, A6, A0, FF, FF, 8B, 55, EC, B8, 58, 86...
 
[+]

Entropy:
7.9998

Developed / compiled with:
Microsoft Visual C++

Code size:
65 KB (66,560 bytes)

Scan crestron_toolbox_2.42.703.00.exe - Powered by Reason Core Security