tc00213300g.exe

TOSHIBA CORPORATION

This is a setup program which is used to install the application. The file has been seen being downloaded from support.toshiba.ca.
Publisher:
TOSHIBA CORPORATION  (signed and verified)

MD5:
8168e75c34cff1fc1d962c54a24499c0

SHA-1:
bea2399779964300337175d1b500364dd92ef34a

SHA-256:
957a5281141e47a9d66352d872f5c21760db88d0dc99576203142b1e971be1fc

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 11:37:36 AM UTC  (today)

File size:
6.7 MB (6,994,672 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\toshiba\tosapins\comps1\tc0021330\tc00213300g.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/21/2010 8:00:00 PM

Valid to:
4/22/2011 7:59:59 PM

Subject:
CN=TOSHIBA CORPORATION, OU=TOSHIBA CORPORATION, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TOSHIBA CORPORATION, L="1-1 Shibaura, 1-chome, Minato-ku", S=Tokyo, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4B06FB7842759523C64BC79DEAA482C6

File PE Metadata
Compilation timestamp:
4/14/2010 7:54:58 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
196608:RmpA8xpH2Wcp9v/N6EZDyxbrpIgn5LspK:QJxpHHcp76EZDN0spK

Entry address:
0x82A5

Entry point:
E8, 83, 26, 00, 00, E9, 17, FE, FF, FF, 8B, 44, 24, 04, 85, C0, 56, 8B, F1, C6, 46, 0C, 00, 75, 63, E8, 51, 11, 00, 00, 89, 46, 08, 8B, 48, 6C, 89, 0E, 8B, 48, 68, 89, 4E, 04, 8B, 0E, 3B, 0D, A0, E7, 41, 00, 74, 12, 8B, 0D, BC, E6, 41, 00, 85, 48, 70, 75, 07, E8, 23, 30, 00, 00, 89, 06, 8B, 46, 04, 3B, 05, C0, E5, 41, 00, 74, 16, 8B, 46, 08, 8B, 0D, BC, E6, 41, 00, 85, 48, 70, 75, 08, E8, C4, 28, 00, 00, 89, 46, 04, 8B, 46, 08, F6, 40, 70, 02, 75, 14, 83, 48, 70, 02, C6, 46, 0C, 01, EB, 0A, 8B, 08, 89, 0E...
 
[+]

Entropy:
7.9856  (probably packed)

Code size:
92 KB (94,208 bytes)

The file tc00213300g.exe has been seen being distributed by the following URL.