There are investigative ambitions in Microsoft operating systems, but only since Windows 8.1: unlike its predecessors (until Windows 8.0), the operating system uses PowerShell to generate hash values. These are checksums that you can think of as fingerprints. Each file has a specific symbol encoded for the character – depending on the hashing algorithm used. If one bit changes in a file, it has a completely different checksum value. This can be used to verify the authenticity and integrity of the file and therefore its security. You can also check this using the web service VirusTotal suspicious files for malicious code; The time-consuming download is no longer necessary. Below you’ll find an introduction to the basics of checksums and hashing. Next, we will introduce you to third-party tricks and tools that calculate the hash (more conveniently than Windows itself). This is also about VirusTotal: you usually upload files to be scanned for malicious code to the multivirus scanner’s cloud service, thanks to the hash you provide yourself. This is at least possible for files already scanned by VirusTotal.
Article at a glance:
What are the hash values? What do you want from them?
Hash values are strings of characters that are produced when the hash algorithm is implemented. You can create such checksums based on files or scripts. These codes are useful if you want to determine whether a download was successful: Some download portals provide hashes for files that can be downloaded. By using the same hashing technology as the portal operator from which you obtained the file, you can be sure the latter is properly saved for you; The hashes must be identical. If there is an error in the download, the values are different from each other. This also applies if the hypothetical case occurs that the attacker has tampered with the download data stream.
If you want to check your own files (not available for download), hashing is a good solution: parse the file twice with a time offset. If you haven’t edited it, the second hash should be the same as the first. To facilitate control, it is advisable to save the first value in a TXT text document. Common hash actions are MD5, SHA1, CRC32, SHA-256, SHA-512, and SHA-384.
Create hash values - how?
Windows: Create hashes with built-in tools
Create and analyze hashes (via context menu)
If you want to hash a file via its context menu, File FileMenu Tools. It is a suite that you can also use to transfer, copy, delete files, encrypt, copy tracks and more with it. After installation, click on a file to be checked with the right mouse button, move the mouse cursor to the “File List Tools” and click on the entry “Calculate and check checksum”. In the new window, use the drop-down list to choose between “MD5”, “SHA1”, “SHA256”, “SHA384”, “SHA512” and “CRC32”. If you confirm with the “Start” button, you will see the corresponding checksum in the lower area (to the right of “Calculated”).
Portable and slim tool: MD5 scan
subordinate MD5 check It does not require any installation and is specialized in creating MD5 checksums. It shows by default, if you wish you can switch to “SHA1”, “SHA256” or “SHA512” in the dropdown.
subordinate MD5 Hasher File It is based on .NET Framework, must be installed and accept one or more files via the Select Files button. Import also works by drag and drop. The tool calculates the MD5 checksum of the uploaded files without further clicking. If you import multiple files, use the “Compare with Clipboard” context menu function to check if the Windows cache hash value is the same as the value of the file you right-clicked.
HashTab (displays hash in file properties in new tab)
Hashen mit VirusTotal
Start a virus scan with a checksum
It is faster to create hashes with small files than with larger files. For example, we need Windows PowerShell in
get-filehash “D:ISOsServer 2016 x64.ISO
38 seconds to think of a SHA-256 verification code from a 6.5 GB ISO server for Windows (file saved on hard drive, Core i7-6700K processor). In contrast, a hash of the Samsung NVMe driver setup file (about 1.5MB) was generated in an instant. Especially if you use the hash tools to calculate checksums for entire folder items, you should be prepared to wait from a few seconds to several minutes, depending on the file size.
Operating System Information Checker: Windows 7 ISO Verifier
“Certified gamer. Problem solver. Internet enthusiast. Twitter scholar. Infuriatingly humble alcohol geek. Tv guru.”