| File Name | setup.exe |
| File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
| Scanner Version | 1.0.229.174 |
| Database Version | 2025-11-19 01:00:20 UTC |
No threats detected by our scanner
| Hash Type | Value | Action |
|---|---|---|
| MD5 |
5663c3805e752211cd7fb11b18d49aa3
|
|
| SHA1 |
f9326fce89e093830a6c010852b97a3bb9fffc63
|
|
| SHA256 |
e6bfdf4f41417fa367ef4b1f945f9ac79f1f7f8ea6743afed18a45eae6a10817
|
|
| SHA512 |
4a198081b20374d6797d5336cb047a6c9300ec015bf87993896033404b7993e7e8e5b070d2b0c1b63713478157575965d46a82a50c9a64d21732f9b0d8c1aa70
|
|
| ImpHash |
884310b1928934402ea6fec1dbd3cf5e
|
| Icon |
Hash: fc974375289dc3af697865336358b0d7
Fuzzy: b3392adbff6dedfa80b9283ffa9c1796 dHash: 2b51b3e87931152f |
| Image Base | 0x00400000 |
| Entry Point | 0x00409c14 |
| Compilation Time | 1992-06-19 22:22:17 |
| Checksum | 0x00000000 (Actual: 0x0020f5b1) |
| OS Version | 1.0 |
| PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
| Digital Signature | No valid SignedData structure was found. |
| Imports |
5 libraries
kernel32, user32, oleaut32, advapi32, comctl32 |
| Exports | 0 functions |
| Resources | 11 Resources |
| Sections | 8 Sections |
| Comments | This installation was built with Inno Setup. |
| CompanyName | tapochek.net |
| FileDescription | Wolfenstein |
| FileVersion | 1.0.0.0 |
| LegalCopyright | R.G. Mechanics, spider91 |
| ProductName | Wolfenstein |
| ProductVersion | 1.0.0.0 |
| Translation | 0x0000 0x04b0 |
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
|---|---|---|---|---|---|---|
CODE |
0x00001000 |
37,688 bytes | 37,888 bytes | 6.56 (Compressed) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
0F1E58BEE0E7F7B353DE3DDE9DE0259D |
DATA |
0x0000b000 |
588 bytes | 1,024 bytes | 2.75 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
1AFD2A5D0373792E0D1942B295194E3C |
BSS |
0x0000c000 |
3,664 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.idata |
0x0000d000 |
2,384 bytes | 2,560 bytes | 4.43 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
BB5485BF968B970E5EA81292AF2ACDBA |
.tls |
0x0000e000 |
8 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0000f000 |
24 bytes | 512 bytes | 0.20 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
9BA824905BF9C7922B6FC87A38B74366 |
.reloc |
0x00010000 |
2,224 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rsrc |
0x00011000 |
18,912 bytes | 18,944 bytes | 5.77 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
FD2AAB5AE49E84C2E74319F2CAB3076C |
1 section(s) with elevated entropy (≥6.5) - possible compression
| Resource Type | Count | Total Size | Percentage |
|---|---|---|---|
| RT_ICON | 1 | 12,840 bytes | |
| RT_STRING | 6 | 2,710 bytes | |
| RT_RCDATA | 1 | 44 bytes | |
| RT_GROUP_ICON | 1 | 20 bytes | |
| RT_VERSION | 1 | 1,208 bytes | |
| RT_MANIFEST | 1 | 1,376 bytes |
| Product | Wolfenstein |
| Description | Wolfenstein |
| File Version | 1.0.0.0 |
| Copyright | R.G. Mechanics, spider91 |
✓ This file has been digitally signed and the certificate chain has been verified
No valid SignedData structure was found.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:
Download Anti-MalwareThis file appears clean, but regular security maintenance is important
Stay Malware-Free: Keep Your PC Protected with Gridinsoft Anti-Malware
Gridinsoft Anti-Malware offers just that—peace of mind with a robust, user-friendly solution that’s constantly updated to combat the latest threats. Designed by cybersecurity experts, it provides real-time protection and effortless malware removal. It’s not just about detecting threats; it's about enhancing your digital life with uninterrupted security. Give it a try and experience what it feels like to browse worry-free!