× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7b532429dbf2c4552a2d175c995b262f3d5017d7a496869021d730cfbe065639
File name: HDSentinel.exe
Detection ratio: 0 / 62
Analysis date: 2017-07-08 10:05:26 UTC ( 1 year, 8 months ago )
Antivirus Result Update
Ad-Aware 20170708
AegisLab 20170708
AhnLab-V3 20170707
Alibaba 20170708
ALYac 20170708
Antiy-AVL 20170708
Arcabit 20170708
Avast 20170708
AVG 20170708
Avira (no cloud) 20170708
AVware 20170708
Baidu 20170707
BitDefender 20170708
CAT-QuickHeal 20170708
ClamAV 20170708
CMC 20170707
Comodo 20170708
CrowdStrike Falcon (ML) 20170420
Cylance 20170708
Cyren 20170708
DrWeb 20170708
Emsisoft 20170708
Endgame 20170706
ESET-NOD32 20170708
F-Prot 20170708
F-Secure 20170708
Fortinet 20170629
GData 20170708
Ikarus 20170708
Sophos ML 20170607
Jiangmin 20170708
K7AntiVirus 20170707
K7GW 20170708
Kaspersky 20170708
Kingsoft 20170708
Malwarebytes 20170708
MAX 20170708
McAfee 20170708
McAfee-GW-Edition 20170707
Microsoft 20170708
eScan 20170708
NANO-Antivirus 20170708
nProtect 20170708
Palo Alto Networks (Known Signatures) 20170708
Panda 20170708
Qihoo-360 20170708
Rising 20170708
SentinelOne (Static ML) 20170516
Sophos AV 20170708
SUPERAntiSpyware 20170708
Symantec 20170707
Symantec Mobile Insight 20170707
Tencent 20170708
TheHacker 20170707
TrendMicro 20170708
TrendMicro-HouseCall 20170708
Trustlook 20170708
VBA32 20170707
VIPRE 20170708
ViRobot 20170708
Webroot 20170708
WhiteArmor 20170706
Yandex 20170707
Zillya 20170707
ZoneAlarm by Check Point 20170708
Zoner 20170708
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2005-2012 H.D.S. Hungary

Product Hard Disk Sentinel
Original name HDSentinel.exe
Internal name HDSentinel
File version 4.0.0.0
Description Hard Disk Sentinel Engine
Signature verification Signed file, verified signature
Signing date 7:24 AM 2/1/2012
Signers
[+] Janos Mathe
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer COMODO Code Signing CA 2
Valid from 1:00 AM 10/18/2011
Valid to 12:59 AM 10/18/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B84700C92263480707F2A13F2A517A545B520C7A
Serial number 6A 09 16 67 23 E6 A1 47 75 CC AC 33 2E 9E 02 C9
[+] COMODO Code Signing CA 2
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 8/24/2011
Valid to 11:48 AM 5/30/2020
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B64771392538D1EB7A9281998791C14AFD0C5035
Serial number 10 70 9D 4F F5 54 08 D7 30 60 01 D8 EA 91 75 BB
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network?
Status Valid
Issuer AddTrust External CA Root
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbprint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Counter signers
[+] COMODO Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm sha1RSA
Thumbrint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network?
Status Valid
Issuer AddTrust External CA Root
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbrint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x002E1F48
Number of sections 8
PE sections
Overlays
MD5 d251e4cc8d0daa715cc8283421fbd431
File type data
Offset 4130816
Size 6296
Entropy 7.40
PE imports
GetRandomRgn
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
OpenServiceA
QueryServiceConfigA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
RegCreateKeyExA
DeleteService
CloseServiceHandle
RegFlushKey
OpenProcessToken
DeregisterEventSource
QueryServiceStatus
RegisterEventSourceA
RegOpenKeyExA
RegDeleteValueA
RegConnectRegistryA
SetServiceStatus
GetUserNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CreateServiceA
RegSetValueExA
StartServiceA
RegEnumValueA
OpenSCManagerA
ReportEventA
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
InitCommonControls
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
PolyPolyline
SetMapMode
GetWindowOrgEx
SetTextAlign
GetPaletteEntries
CombineRgn
GetTextExtentPointA
SetPixel
EndDoc
IntersectClipRect
CopyEnhMetaFileA
CreatePalette
CreateDIBitmap
GetDIBits
GetEnhMetaFileBits
GetDCOrgEx
StretchBlt
StretchDIBits
GetTextMetricsA
SetWindowExtEx
Arc
SetViewportExtEx
ExtCreatePen
SetBkColor
SetWinMetaFileBits
GetBkColor
GetDIBColorTable
DeleteEnhMetaFile
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
Pie
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
EndPath
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
BitBlt
GetDeviceCaps
SetAbortProc
CreateBrushIndirect
SelectPalette
StrokePath
CreateEnhMetaFileA
ExtSelectClipRgn
CloseEnhMetaFile
SetROP2
EndPage
SetDIBColorTable
GetTextColor
BeginPath
DeleteObject
CreatePenIndirect
PatBlt
CreatePen
SetStretchBltMode
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetMapMode
GetEnhMetaFileDescriptionA
StartPage
RealizePalette
CreatePatternBrush
SetEnhMetaFileBits
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
GetTextAlign
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
SetWindowOrgEx
GetTextExtentPoint32W
LPtoDP
CreatePolygonRgn
CreateICA
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
MaskBlt
GetEnhMetaFilePaletteEntries
RestoreDC
GetBitmapBits
GetBkMode
CreateDIBSection
SetTextColor
GetClipBox
GetCurrentObject
MoveToEx
SetViewportOrgEx
ExtTextOutW
CreateCompatibleDC
SetBrushOrgEx
CreateRectRgn
SelectObject
StartDocA
CreateCompatibleBitmap
CreateSolidBrush
Polyline
Ellipse
IcmpCloseHandle
IcmpSendEcho
IcmpCreateFile
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
FindFirstFileW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetErrorMode
GetFullPathNameA
GetTempPathA
WideCharToMultiByte
GetOverlappedResult
LocalFree
InterlockedExchange
WriteFile
GetDiskFreeSpaceA
SetFileAttributesA
SetEvent
QueryDosDeviceA
MoveFileA
ResumeThread
GetLogicalDriveStringsA
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
OutputDebugStringA
VerLanguageNameA
DeviceIoControl
GetEnvironmentVariableA
Beep
GlobalFindAtomA
ExitProcess
GetModuleFileNameA
RaiseException
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
GetPrivateProfileStringA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
GlobalMemoryStatus
CreateThread
CreatePipe
GetExitCodeThread
GlobalAddAtomA
MulDiv
ExitThread
SetPriorityClass
TerminateProcess
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
EnterCriticalSection
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetVersionExA
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetProcAddress
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
ResetEvent
GetComputerNameA
FindNextFileA
IsValidLocale
GlobalLock
GetTimeZoneInformation
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
FindNextFileW
GetThreadLocale
GlobalUnlock
GlobalAlloc
lstrlenW
GetACP
FileTimeToLocalFileTime
SizeofResource
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
GetCPInfo
GetCommandLineA
InterlockedCompareExchange
SuspendThread
GetSystemDefaultLangID
QueryPerformanceFrequency
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetPriorityClass
SetLocalTime
GetVersion
FreeResource
CreateProcessA
VirtualFree
Sleep
FindResourceA
VirtualAlloc
CompareStringA
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
WNetAddConnection2A
OleUninitialize
CoUninitialize
DoDragDrop
CoInitialize
CreateStreamOnHGlobal
StringFromCLSID
IsAccelerator
CoCreateGuid
RegisterDragDrop
RevokeDragDrop
OleGetClipboard
CoGetClassObject
ProgIDFromCLSID
OleDraw
IsEqualGUID
OleInitialize
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CreateDataAdviseHolder
CoTaskMemAlloc
ReleaseStgMedium
OleSetMenuDescriptor
OleSetClipboard
VariantChangeType
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayPtrOfIndex
SysAllocStringLen
VariantCopyInd
VariantClear
GetActiveObject
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
GetErrorInfo
SysFreeString
VariantInit
SHBrowseForFolderA
SHChangeNotify
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
RedrawWindow
GetMessagePos
SetWindowRgn
UnregisterHotKey
DestroyWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
ScrollWindowEx
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
GetMessageTime
ChildWindowFromPoint
OpenWindowStationA
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
IsWindowEnabled
GetClientRect
ToAscii
DrawTextW
SetScrollPos
GetThreadDesktop
CallNextHookEx
GetKeyboardState
ClientToScreen
GetTopWindow
RegisterHotKey
EnumClipboardFormats
LockWindowUpdate
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
GetKeyState
PtInRect
GetMessageA
ShowCursor
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
DefMDIChildProcA
ShowWindow
SetClassLongA
GetPropA
GetMenuState
GetClipboardFormatNameA
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
PeekMessageA
ScrollDC
IsCharAlphaA
TranslateMessage
SetThreadDesktop
GetWindow
ActivateKeyboardLayout
InsertMenuItemA
CreatePopupMenu
CopyImage
GetIconInfo
LoadStringA
SetParent
SetClipboardData
GetSystemMetrics
IsZoomed
GetWindowPlacement
GetWindowRgn
GetKeyboardLayoutList
DrawMenuBar
CharLowerA
IsIconic
RegisterClassA
OpenDesktopA
GetMenuItemCount
GetWindowLongA
SetTimer
OemToCharA
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
GetSysColorBrush
CreateMenu
GetUpdateRect
WindowFromDC
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
DrawEdge
SetCapture
BeginPaint
OffsetRect
GetScrollPos
keybd_event
KillTimer
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
MapWindowPoints
SendDlgItemMessageA
IsCharAlphaNumericA
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
SetWindowLongA
SetProcessWindowStation
SetKeyboardState
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
DrawIconEx
CreateWindowExA
GetDlgItem
GetClipboardData
ScreenToClient
GetProcessWindowStation
CloseWindowStation
InsertMenuA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
BeginDeferWindowPos
ValidateRect
GetKeyboardLayout
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
OpenClipboard
EmptyClipboard
DrawTextA
IntersectRect
GetScrollInfo
GetCapture
WaitMessage
FindWindowA
MessageBeep
GetCaretPos
DrawTextExA
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
mouse_event
LoadKeyboardLayoutA
GetMenuItemRect
GetSysColor
SetScrollInfo
GetMenuItemInfoA
EndDeferWindowPos
SystemParametersInfoA
GetDoubleClickTime
DestroyIcon
GetKeyNameTextA
IsWindowVisible
GetDesktopWindow
SubtractRect
CharToOemA
GetDCEx
WinHelpA
UnionRect
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
SendMessageTimeoutA
CharLowerBuffA
CreateIcon
CloseDesktop
IsRectEmpty
GetCursor
GetFocus
CloseClipboard
GetKeyboardType
SetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
InternetAutodial
HttpSendRequestA
InternetOpenUrlA
InternetSetOptionA
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetAutodialHangup
InternetQueryOptionA
InternetGetConnectedState
HttpQueryInfoA
timeEndPeriod
mciSendCommandA
mciGetErrorStringA
timeGetTime
timeBeginPeriod
EnumPrintersA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
WSAStartup
gethostbyname
inet_ntoa
gethostname
WSACleanup
Number of PE resources by type
RT_BITMAP 64
RT_STRING 39
RT_CURSOR 20
RT_GROUP_CURSOR 20
RT_RCDATA 20
PNG 4
RT_DIALOG 1
RT_ICON 1
JPG 1
RT_MANIFEST 1
LNG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 151
GERMAN 12
HUNGARIAN DEFAULT 9
ENGLISH US 2
PE resources
ExifTool file metadata
CodeSize
3022336

FileDescription
Hard Disk Sentinel Engine

InitializedDataSize
1107456

ImageVersion
0.0

ProductName
Hard Disk Sentinel

FileVersionNumber
4.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileTypeExtension
exe

OriginalFileName
HDSentinel.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
4.0.0.0

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
HDSentinel

SubsystemVersion
4.0

ProductVersion
4

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright 2005-2012 H.D.S. Hungary

MachineType
Intel 386 or later, and compatibles

CompanyName
H.D.S. Hungary

LegalTrademarks
Copyright 2005-2012 H.D.S. Hungary

FileSubtype
0

ProductVersionNumber
4.0.0.0

EntryPoint
0x2e1f48

ObjectFileType
Executable application

File identification
MD5 fee1d045e9b728a23c6046c1afff3cd0
SHA1 34b1417c8cc24794a9ecdbcec965aecc5e05aa41
SHA256 7b532429dbf2c4552a2d175c995b262f3d5017d7a496869021d730cfbe065639
ssdeep
98304:AwAwQ1axG3/b8vjzx0ss0S9tg/ZqC0HEy0X2uIQ088AKvrNXzvn6Xs75u:pSUqC06cQ088AgrRzvn6Xs4

authentihash d18bdfc786969f9aeda39c1e2159ff0594db7769040dc5f852ed9f9a1e8188ca
imphash 43f36b2f550fd75684dfa6b15a4b8778
File size 3.9 MB ( 4137112 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (39.3%)
Win32 EXE PECompact compressed (generic) (38.0%)
Win32 Executable Delphi generic (12.9%)
Win32 Executable (generic) (4.1%)
Win16/32 Executable Delphi generic (1.8%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2012-02-02 08:55:42 UTC ( 7 years, 1 month ago )
Last submission 2017-07-08 10:05:26 UTC ( 1 year, 8 months ago )
File names HDSentinel.exe
HDSentinel.exe
HDSentinel.exe
HDSentinel.exe
hdsentinel.exe
HDSentinel.exe
fee1d045e9b728a23c6046c1afff3cd0
file-3963162_exe
smona_7b532429dbf2c4552a2d175c995b262f3d5017d7a496869021d730cfbe065639.bin
hdsentinel.exe
HDSentinel.exe
HDSentinel
HDSentinel.exe
hdsentinel.exe
hdsentinel.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!