× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4f102aea5fcb1ae43b2fc4363f9f106b08ef3decb24e077ec6c42b9ab58f1acc
File name: HDD State Inspector
Detection ratio: 2 / 57
Analysis date: 2015-03-31 05:07:13 UTC ( 4 years, 1 month ago )
Antivirus Result Update
TrendMicro-HouseCall Suspicious_GEN.F47V0126 20150331
VBA32 suspected of Trojan.Downloader.gen.h 20150330
Ad-Aware 20150331
AegisLab 20150331
Yandex 20150330
AhnLab-V3 20150331
Alibaba 20150331
ALYac 20150331
Antiy-AVL 20150331
Avast 20150331
AVG 20150331
Avira (no cloud) 20150331
AVware 20150331
Baidu-International 20150330
BitDefender 20150331
Bkav 20150330
ByteHero 20150331
CAT-QuickHeal 20150331
ClamAV 20150331
CMC 20150330
Comodo 20150331
Cyren 20150331
DrWeb 20150331
Emsisoft 20150331
ESET-NOD32 20150331
F-Prot 20150331
F-Secure 20150330
Fortinet 20150331
GData 20150331
Ikarus 20150331
Jiangmin 20150330
K7AntiVirus 20150330
K7GW 20150331
Kaspersky 20150330
Kingsoft 20150331
Malwarebytes 20150331
McAfee 20150331
McAfee-GW-Edition 20150330
Microsoft 20150331
eScan 20150331
NANO-Antivirus 20150331
Norman 20150330
nProtect 20150330
Panda 20150330
Qihoo-360 20150331
Rising 20150330
Sophos AV 20150331
SUPERAntiSpyware 20150331
Symantec 20150331
Tencent 20150331
TheHacker 20150330
TotalDefense 20150330
TrendMicro 20150331
VIPRE 20150331
ViRobot 20150331
Zillya 20150331
Zoner 20150330
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Altrixsoft. Copyright (C) 2002-2009. All rights reserved.

Publisher Altrixsoft
Original name HDDStateInspector.EXE
Internal name HDD State Inspector
File version 3, 30, 250, 0
Description Hard Drive Inspector Professional
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-09-14 02:42:45
Entry Point 0x0012621C
Number of sections 4
PE sections
PE imports
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
RegCreateKeyW
OpenServiceW
ControlService
LookupPrivilegeValueW
RegOpenKeyExW
RegRestoreKeyW
RegSetValueW
CryptHashData
RegQueryValueExW
CryptCreateHash
CloseServiceHandle
GetFileSecurityW
QueryServiceStatus
RegEnumKeyW
SetFileSecurityW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueW
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
CryptAcquireContextW
RegLoadKeyW
IsTextUnicode
CryptDestroyHash
RegDeleteValueW
StartServiceW
RegSetValueExW
CryptGetHashParam
OpenSCManagerW
RegSaveKeyW
RegUnLoadKeyW
ImageList_SetBkColor
ImageList_GetImageInfo
PropertySheetW
Ord(17)
ImageList_Read
ImageList_Remove
ImageList_DrawIndirect
ImageList_Merge
ImageList_DrawEx
Ord(13)
ImageList_Write
ImageList_GetImageCount
DestroyPropertySheetPage
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
ImageList_GetIconSize
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Add
ImageList_Duplicate
CreatePropertySheetPageW
ImageList_Create
Ord(14)
ImageList_LoadImageW
SetDIBits
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
PlayMetaFile
GetObjectType
CreateMetaFileW
SetColorAdjustment
SetPixel
EndDoc
IntersectClipRect
StretchDIBits
OffsetWindowOrgEx
CreatePalette
EqualRgn
CreateDIBitmap
GetDIBits
SetTextAlign
GetDCOrgEx
StretchBlt
Escape
ScaleViewportExtEx
ArcTo
Pie
CloseMetaFile
SetViewportExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
CreateFontIndirectW
GetClipBox
GetCurrentPositionEx
CreateRectRgnIndirect
GetBitmapBits
PolyDraw
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
OffsetClipRgn
BitBlt
SetAbortProc
FrameRgn
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
EndPage
AbortDoc
GetNearestPaletteIndex
GetTextColor
SetPixelV
SetWindowExtEx
DeleteObject
PlayMetaFileRecord
GetWindowExtEx
SetBitmapBits
PatBlt
CreatePen
EnumMetaFile
SetStretchBltMode
Rectangle
PolylineTo
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
GetSystemPaletteEntries
GetCharWidthW
StartPage
GetObjectW
CreateDCW
CreateBitmapIndirect
RealizePalette
CreateHatchBrush
CreatePatternBrush
OffsetRgn
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
GdiFlush
SelectClipRgn
GetTextAlign
SetWindowOrgEx
GetClipRgn
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
GetPixel
SetMapperFlags
GetTextExtentExPointW
SelectClipPath
CreateDIBSection
SetTextColor
ExtFloodFill
GetCurrentObject
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
CreateFontW
PolyBezier
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
SetTextJustification
CreateSolidBrush
Polyline
DPtoLP
StartDocW
Ellipse
DeleteMetaFile
SetThreadLocale
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
IsValidLocale
GetFileAttributesW
lstrcmpW
SystemTimeToTzSpecificLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
SetErrorMode
FreeEnvironmentStringsW
lstrcatW
FatalAppExitA
SetStdHandle
GetFileTime
lstrcmpiA
GetCPInfo
GetProcAddress
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
WriteFile
GetProfileIntW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GetStringTypeExW
FindClose
InterlockedDecrement
MoveFileW
GetFullPathNameW
GetCurrentThread
SetLastError
PeekNamedPipe
LocalLock
GetUserDefaultLangID
GetModuleFileNameW
Beep
ExitProcess
GetVersionExA
GetModuleFileNameA
GlobalHandle
GlobalFindAtomW
LoadLibraryA
RaiseException
EnumSystemLocalesA
EnumResourceLanguagesW
SetConsoleCtrlHandler
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
GetPrivateProfileStringW
CreateEventW
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
UnlockFile
ExitThread
SetEnvironmentVariableA
TerminateProcess
SearchPathW
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
LeaveCriticalSection
GetNumberFormatW
GetModuleHandleA
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
LoadLibraryW
GlobalGetAtomNameW
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
CopyFileW
GlobalSize
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
OpenProcess
DeleteFileA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
GetFileInformationByHandle
lstrcmpA
FindNextFileW
GetCurrentThreadId
CompareStringA
FindFirstFileW
GlobalMemoryStatus
DuplicateHandle
GlobalLock
SetVolumeLabelW
SuspendThread
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LocalUnlock
GetLocaleInfoW
InterlockedIncrement
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GetTimeFormatW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
WinExec
VirtualFree
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
WritePrivateProfileStringW
lstrcpynW
QueryPerformanceFrequency
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetModuleHandleW
FreeResource
FindResourceExW
SizeofResource
WideCharToMultiByte
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
IsBadReadPtr
SetThreadPriority
IsBadCodePtr
VirtualAlloc
GetTimeFormatA
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
NetMessageBufferSend
Netbios
VarUdateFromDate
SysStringLen
SysStringByteLen
SafeArrayUnaccessData
VarBstrFromDec
VarDecFromStr
SafeArrayDestroyData
VarBstrCat
SysAllocString
SafeArrayCreate
SafeArrayAllocDescriptor
VariantCopy
VariantChangeTypeEx
SafeArrayGetElemsize
VariantChangeType
VariantInit
SafeArrayAllocData
VarBstrFromI2
SafeArrayDestroyDescriptor
SafeArrayAccessData
SafeArrayGetLBound
VarBstrFromI4
VarBstrFromDate
VarBstrFromUI4
VariantCopyInd
SafeArrayDestroy
SafeArrayUnlock
VarBstrCmp
SafeArrayGetUBound
SafeArrayCreateVector
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SafeArrayLock
OleCreateFontIndirect
SafeArrayGetElement
SafeArrayPtrOfIndex
CreateErrorInfo
VarBstrFromCy
VarCyCmp
VarCyFromStr
SafeArrayGetVartype
SafeArrayRedim
VarDateFromUdate
VarDecCmp
SafeArrayCopy
SetErrorInfo
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VariantClear
SysReAllocStringLen
VarBstrFromR4
SysReAllocString
VarDateFromStr
GetErrorInfo
SafeArrayGetDim
SafeArrayPutElement
VarBstrFromR8
EmptyWorkingSet
UuidCreate
UuidToStringW
RpcStringFreeW
CM_Free_Res_Des_Handle
SetupDiOpenDevRegKey
SetupCloseFileQueue
SetupDiOpenDeviceInfoW
SetupDiGetDriverInfoDetailW
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
SetupDiSetSelectedDriverW
SetupDiGetDriverInstallParamsW
SetupDiBuildDriverInfoList
CM_Free_Log_Conf_Handle
SetupDiEnumDriverInfoW
CM_Get_Res_Des_Data_Size_Ex
CM_Get_Device_ID_ExW
SetupDiCreateDeviceInfoListExW
SetupDiOpenClassRegKeyExW
CM_Get_DevNode_Status_Ex
SetupDiGetDeviceInstallParamsW
SetupScanFileQueueW
SetupDiEnumDeviceInfo
SetupDiDestroyDriverInfoList
SetupDiSetDeviceInstallParamsW
CM_Get_First_Log_Conf_Ex
SetupDiGetDeviceRegistryPropertyW
SetupDiClassGuidsFromNameExW
CM_Get_Res_Des_Data_Ex
CM_Get_Next_Res_Des_Ex
SetupOpenFileQueue
SetupDiGetDeviceInfoListDetailW
SetupDiGetClassDevsExW
DragQueryFileW
ShellExecuteW
SHBrowseForFolderW
Shell_NotifyIconW
ExtractIconW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
DragFinish
PathIsUNCW
PathFindFileNameW
PathAddBackslashW
PathFindExtensionW
PathStripToRootW
PathRemoveExtensionW
RedrawWindow
GetForegroundWindow
SetWindowRgn
InsertMenuItemW
SetMenuItemBitmaps
LoadBitmapW
SetRectEmpty
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
ScrollWindowEx
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
MapDialogRect
GetDlgCtrlID
SendMessageW
UnregisterClassA
GetMenuStringW
UnregisterClassW
GetClientRect
SetWindowContextHelpId
DefWindowProcW
SetMenuDefaultItem
SetScrollPos
InSendMessage
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
GetKeyboardState
GetActiveWindow
ShowCursor
OpenClipboard
GetWindowTextW
RegisterClipboardFormatW
PostThreadMessageW
CopyAcceleratorTableW
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
DrawTextW
GetKeyState
DestroyWindow
DrawEdge
GetParent
UpdateWindow
GetPropW
CharPrevW
SetClassLongW
ShowScrollBar
CheckRadioButton
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetDesktopWindow
PeekMessageW
TranslateMDISysAccel
GetTabbedTextExtentA
EnableWindow
SetWindowPlacement
CharUpperW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
GetDlgItemInt
SetClipboardData
GetTabbedTextExtentW
GetIconInfo
LoadStringA
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
LoadStringW
CloseWindow
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
TrackPopupMenuEx
GetSubMenu
GetScrollRange
SetTimer
IsDialogMessageW
FillRect
GetMenuItemInfoW
CopyRect
GetSysColorBrush
GetDialogBaseUnits
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsChild
MapWindowPoints
RegisterWindowMessageW
LockWindowUpdate
IsIconic
EmptyClipboard
BeginPaint
OffsetRect
DefMDIChildProcW
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
ClipCursor
SendNotifyMessageW
ToAsciiEx
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
DrawIcon
EnumChildWindows
DrawTextExW
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
GetKeyNameTextW
CheckDlgButton
ReleaseCapture
EqualRect
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
PtInRect
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateMenu
GetDlgItem
RemovePropW
SystemParametersInfoW
SetCursor
BringWindowToTop
ClientToScreen
GetScrollInfo
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
IsDlgButtonChecked
DestroyAcceleratorTable
CreateIconFromResourceEx
CreateIconFromResource
LoadCursorW
GetSystemMenu
FindWindowExW
DispatchMessageW
InsertMenuW
SetForegroundWindow
ExitWindowsEx
SetFocus
WindowFromDC
GetAsyncKeyState
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
EndDialog
HideCaret
GetKeyboardLayout
CreateIconIndirect
GetCapture
WaitMessage
ScreenToClient
MessageBeep
LoadMenuW
CreateAcceleratorTableW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
DefFrameProcW
GetMenuState
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
SetDlgItemInt
ReuseDDElParam
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
LookupIconIdFromDirectoryEx
GetSysColor
SetDlgItemTextW
SetScrollInfo
CopyImage
EndDeferWindowPos
SystemParametersInfoA
GetDoubleClickTime
DestroyIcon
GetTopWindow
IsWindowVisible
WinHelpW
UnpackDDElParam
SetCursorPos
GetDCEx
UnionRect
GetDC
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
SetWindowsHookExW
ValidateRect
IsRectEmpty
IsMenu
GetFocus
wsprintfW
CloseClipboard
GetDlgItemTextW
TranslateAcceleratorW
GetMenu
SetMenu
GetMenuCheckMarkDimensions
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
sndPlaySoundW
PlaySoundW
ClosePrinter
OpenPrinterW
DocumentPropertiesW
GetJobW
GetFileTitleW
GetOpenFileNameW
ChooseColorW
ChooseFontW
GetSaveFileNameW
FindTextW
ReplaceTextW
PrintDlgW
CommDlgExtendedError
PageSetupDlgW
OleUninitialize
CoUninitialize
OleCreateFromData
StgCreateDocfileOnILockBytes
OleTranslateAccelerator
CoMarshalInterThreadInterfaceInStream
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
StgCreateDocfile
CoFreeUnusedLibraries
CoDisconnectObject
OleRegGetUserType
CoTreatAsClass
StringFromGUID2
CreateILockBytesOnHGlobal
ReadClassStg
CreateStreamOnHGlobal
CreateItemMoniker
CoRegisterClassObject
OleFlushClipboard
ReleaseStgMedium
CoCreateGuid
SetConvertStg
CoGetInterfaceAndReleaseStream
GetHGlobalFromILockBytes
OleCreateFromFile
StringFromCLSID
OleSave
CoRegisterMessageFilter
OleCreateLinkFromData
ReadFmtUserTypeStg
OleGetClipboard
OleDuplicateData
RevokeDragDrop
CLSIDFromString
CreateOleAdviseHolder
OleSetContainedObject
CoGetMalloc
CoGetClassObject
CoCreateInstance
CoInitialize
OleInitialize
CoLockObjectExternal
OleCreateStaticFromData
StringFromIID
OleLoadFromStream
OleRegEnumVerbs
StgOpenStorage
OleLockRunning
OleCreate
OleGetIconOfClass
CoCreateInstanceEx
OleRun
StgIsStorageFile
OleQueryCreateFromData
IsAccelerator
OleLoad
OleQueryLinkFromData
OleSetClipboard
CreateDataAdviseHolder
CoTaskMemAlloc
WriteClassStm
OleSaveToStream
OleCreateLinkToFile
CLSIDFromProgID
WriteClassStg
CoRevokeClassObject
CoInitializeSecurity
GetRunningObjectTable
CreateBindCtx
OleIsRunning
OleSetMenuDescriptor
CreateGenericComposite
OleRegGetMiscStatus
OleIsCurrentClipboard
CreateFileMoniker
CoTaskMemFree
RegisterDragDrop
WriteFmtUserTypeStg
OleUIBusyW
Number of PE resources by type
RT_CURSOR 35
RT_STRING 32
RT_GROUP_CURSOR 30
RT_BITMAP 21
RT_DIALOG 18
RT_ICON 14
RT_GROUP_ICON 4
Struct(241) 3
RT_MENU 2
RT_MESSAGETABLE 1
Struct(240) 1
RT_MANIFEST 1
AVI 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 122
NEUTRAL 43
PE resources
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
671744

ImageVersion
0.0

FileVersionNumber
3.30.250.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
7.1

OriginalFilename
HDDStateInspector.EXE

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3, 30, 250, 0

TimeStamp
2009:09:14 03:42:45+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
HDD State Inspector

ProductVersion
3, 30, 250, 0

FileDescription
Hard Drive Inspector Professional

OSVersion
4.0

FileOS
Win32

LegalCopyright
Altrixsoft. Copyright (C) 2002-2009. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Altrixsoft

CodeSize
2506752

FileSubtype
0

ProductVersionNumber
3.30.250.0

EntryPoint
0x12621c

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 42a607ce9e72cac698ed7ad9044fee07
SHA1 f9edc281815f0cfd6838b553e86b0f133ff3cf5e
SHA256 4f102aea5fcb1ae43b2fc4363f9f106b08ef3decb24e077ec6c42b9ab58f1acc
ssdeep
49152:BtB7yh9YtnT2tRI+ACnmD/fkDbUrzYRsN:Btkhe2bI+Aqw/fVrgsN

authentihash 130802f3b48c34942792d515fca4f94e5ba29170b315f49a7f6f541a64212780
imphash 1366b915ad369007a520c11fde87ce65
File size 3.0 MB ( 3149504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2009-09-16 04:45:05 UTC ( 9 years, 8 months ago )
Last submission 2015-01-24 14:51:53 UTC ( 4 years, 3 months ago )
File names hdinspector.exe
HDD State Inspector
HDInspector.exe
HDDStateInspector.EXE
HDInspector.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.