Analyze suspicious executable files to detect a wide range of potential threats including PE information, unusual entry point positions, packers, compilers, binders/joiners/crypters, exploits, and various architectures.  PRICING CATALOG

Drag & drop your file here or click to browse

Maximum file size: 15 MB (with a valid code) or 3 MB (without a valid code).
Allowed Windows file types: .exe, .dll, .sys, .ocx, .scr, .drv, .cpl

Please select a file to analyze...

Find detailed reports for files by entering MD5, SHA1, or SHA256 hashes. This feature lets you quickly access analysis and insights associated with specific files, helping you verify file integrity and security status.  PRICING CATALOG

Latest Public Analyses
2235CEE2B85E7149B8EB1E983984B551
A158607E499D658B54D123DAF0FDB1B6
A038F4A7DC9A358031C531D89AFC46DB
44078DCBA6BAAB0F3CE7EF39B5BFCDB9
33453459F2ACEE3E41B1711D0A3D1186

Use codes to generate more detailed analysis reports, uncovering executable strings, function tables, and Yara rules for thorough threat detection and data integrity checks.  PRICING CATALOG