toolbox.exe

Crestron Toolbox Application

Crestron Electronics, Inc

Publisher:
Crestron Electronics, Inc  (signed and verified)

Product:
Crestron Toolbox Application

Version:
2.1.0.1

MD5:
116b986a927b81e5941c6a14afc9dfe4

SHA-1:
e9f7daf805df8fc9e1b5faaef1ab6caa51e25ba5

SHA-256:
1b0b2df707704163c0535d401cc1b4a8b998dc2eae495cca3e08fb959631b678

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 8:59:42 AM UTC  (today)

File size:
775.3 KB (793,920 bytes)

Product version:
2.1.0.1

Copyright:
Copyright (c) Crestron Electronics Inc. 2004-2012

Original file name:
Crestron Toolbox.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\crestron\toolbox\toolbox.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/25/2012 5:30:00 AM

Valid to:
3/23/2014 5:29:59 AM

Subject:
CN="Crestron Electronics, Inc", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Crestron Electronics, Inc", L=Rockleigh, S=New Jersey, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
632192F36FD9ED62CC2B20D35BB9E510

File PE Metadata
Compilation timestamp:
4/11/2013 9:44:05 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x1D14F

Entry point:
E8, 3A, 05, 00, 00, E9, D7, FC, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 40, 2A, 43, 00, 89, 0D, 3C, 2A, 43, 00, 89, 15, 38, 2A, 43, 00, 89, 1D, 34, 2A, 43, 00, 89, 35, 30, 2A, 43, 00, 89, 3D, 2C, 2A, 43, 00, 66, 8C, 15, 58, 2A, 43, 00, 66, 8C, 0D, 4C, 2A, 43, 00, 66, 8C, 1D, 28, 2A, 43, 00, 66, 8C, 05, 24, 2A, 43, 00, 66, 8C, 25, 20, 2A, 43, 00, 66, 8C, 2D, 1C, 2A, 43, 00, 9C, 8F, 05, 50, 2A, 43, 00, 8B, 45, 00, A3, 44, 2A, 43, 00, 8B, 45, 04, A3, 48, 2A, 43, 00, 8D, 45, 08, A3, 54, 2A, 43...
 
[+]

Entropy:
5.0218

Code size:
129.5 KB (132,608 bytes)

Scan toolbox.exe - Powered by Reason Core Security