10 Tools to Verify File Integrity Using MD5 and SHA1 Hashes

6 MultiHasher

This utility is by the same developer as the well known HostsMan Windows HOSTS file editor. It has a number of useful options and files can be added to the list in several ways. You can open one or multiple files at once, entire folders (including sub folders), by paths, by running processes and via nine different types of hash list. It can also create a hash value for small text strings. CRC32, MD5, RIPEMD and the SHA family of hash algorithms are supported.


File association, drag and drop and the right click context menu option is also there, along with an option to search for the checksum on Google. A potentially valuable feature for those that need it is the ability to upload and query files on Virustotal. This requires an API key from VirusTotal but anyone can get a key by signing up for a free account. Uploading and checking can then be done from within MultiHasher. Portable and installer versions of MultiHasher are available.

Download MultiHasher

7 7-Zip

7-Zip is probably the most popular and well known free file archiver around today. Not least because of its 7z archive format that can achieve great compression ratios. The ability to verify file checksums with CRC or SHA has been in 7-Zip since 2011. A few years later a function was added to 7-Zip that introduced a context menu entry where you can quickly check a file’s integrity through the program’s user interface.

7zip checksum

Just right click on a file and go to “CRC SHA” and the options will be available to get a checksum for CRC-32, CRC-64, SHA1, SHA256, or the asterisk will get all at once (including BLAKE2sp). Do note that when you select multiple files 7-Zip will give the overall checksums for all files added together and not each file individually. The 7z.exe command line tool has this function by using the “h” command along with a hash switch “-scrc[CRC32|CRC64|SHA1|SHA256|*].

7z.exe h -scrcSHA256 [filetocheck.ext]

Download 7-Zip


HashTab is another tool that uses the system file properties window to show file hashes and is quite similar to HashCheck. After right clicking on the file and going to Properties, the tab is called “File Hashes” and you will get CRC32, MD5 and SHA-1 hash values displayed by default. One major limitation HashTab has compared to HashCheck is it only works on one file at a time.


Pressing Settings gives access to an impressive selection of 27 additional hash values that can all be displayed. These include the Keccak, RIPEMD, SHA and MD families along with several others like GOST, ED2K, Adler32, and Tiger. You can compare the current file with a hash value in the clipboard by using the Hash Comparison box or use the “Compare a file” button to compare another file with the selected one.

Download HashTab

9. Hasher

Not to be confused with the Igorware tool at the top of our list, this hashing tool is pretty simple to use and lets you drag and drop or browse for a single file to get a checksum. We are looking at version 1.20 from 2009 as all the later versions have a five second nag window on startup, so we really can’t recommend them. They do have more available hashes and folder/multi-file support if you feel like trying one out.


This older version is a small executable and will give you hash values for CRC32, MD5, SHA-1, and ELF. The current hash can be copied to the clipboard and you can manually compare the current hash value with a previous one from the clipboard or the next file that gets checked. Enabling the log file will keep a history of processed hashes and any comparison results.

Download Hasher (version 1.20 is at the bottom)

10. Microsoft CertUtil, FCIV, and PowerShell

We’ve grouped these three options together as they are all by Microsoft and the first two are built into Windows. They can be useful for adding into scripts or creating simple drag and drop shortcuts and etc.


CertUtil is a command line tool that is primarily for showing information for and handling digital certificates on the system. One of its functions is being able to show the hash of a file, which is what we are looking for. The command to use for a file is as follows.

Certutil -hashfile [filetocheck.ext]

This will output the SHA1 checksum of the file. Other algorithms are supported, just append MD2, MD4, MD5, SHA256, SHA384, or SHA512 to the line and it will show that value instead. Only one algorithm is supported at a time, so if you want SHA1 and MD5 you will have to run the tool twice.

Certutil -hashfile [filetocheck.ext] MD5

windows certutil


The PowerShell function is also built into Windows so needs no external executable. It works in a similar way to CertUtil. Windows 7 users will need to manually install PowerShell version 4 or above for this command to work.

Get-Filehash [filetocheck.ext]

Just supplying the file to the get-filehash command will output the hash as SHA256 by default. You can change this by adding -a and the new algorithm, MD5, SHA1, SHA384, SHA512, MACTripleDES, and RIPEMD160 are supported.

Get-Filehash [filetocheck.ext] -a SHA1

Note that like the Certutil tool, only one hashing method can be entered into the command at a time.

powershell get-filehash


This last tool is not built into Windows but is still made by Microsoft. The File Checksum Integrity Verifier (FCIV) is from way back in 2004 and Microsoft offers no support for it. It has a few more advanced options than the other two commands, including recursing into subdirectories, an exclusions list and the ability to save/list/verify checksums in an XML database.

Fciv [filetocheck.ext]

By default, FCIV outputs MD5 checksums but you can change this to SHA1 by appending -SHA1 or -Both to output MD5 and SHA1 at the same time.

Fciv [filetocheck.ext] -Both

File Checksum Integrity Verifier

It’s odd this tool has no support because it has a proper knowledge base designation of KB841290 and there is a full page on the Microsoft website detailing FCIV’s usage. A download link is on the same page.

Download Microsoft File Checksum Integrity Verifier

There are dozens of these tools about, and you might already have your favorite. Of course, feel free to tell us about the hash program you like best. If you want to try the reverse and actually have a go at identifying the file from a hash value, you might like to look at this article.

45 Comments - Write a Comment

  1. daniel 3 months ago
  2. Binjamin Man 6 months ago
  3. HMT 12 months ago
  4. Inbo Avis 1 year ago
  5. Jim 2 years ago
    • Mik 2 years ago
    • ugh 1 year ago
  6. Sean Kearney 3 years ago
  7. ray hines 4 years ago
    • Steve 4 years ago
    • Jim "JR" 2 years ago
    • Rob 2 years ago
  8. StarMessage 4 years ago
  9. ruben 5 years ago
    • HAL9000 5 years ago
  10. James 5 years ago
    • HAL9000 5 years ago
      • Shivam Baghel 4 years ago
        • HAL9000 4 years ago
  11. Noel 5 years ago
  12. shrikanth 5 years ago
  13. gokan 5 years ago
  14. TBan 6 years ago
  15. DavidZ 6 years ago
  16. Mick 6 years ago
  17. WG 6 years ago
  18. hamidreza 6 years ago
  19. Sam Smith 6 years ago
  20. phoenix6142 7 years ago
  21. AntonK 7 years ago
  22. John Galt 7 years ago
    • John Fisher 7 years ago
  23. dan 7 years ago
    • HAL9000 7 years ago
    • Carl 2 years ago
  24. rhastu 7 years ago
  25. Lawrence 7 years ago
    • HAL9000 7 years ago
  26. Catalin 7 years ago
  27. taco 7 years ago
  28. Vinzzy 8 years ago
  29. Billy 8 years ago
  30. dragon788 8 years ago
  31. whaha94 10 years ago
  32. Shlomo 10 years ago

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Your comment is subject to approval. Read our Terms of Use. If you are seeking additional information on this article, please contact us directly.