pestudio is an application that performs Malware Initial Assessment of any executable file (*.exe, *.dll, *.sys, *.cpl, etc...).

Malicious executable often attempts to hide its malicious intents and to evade detection. In doing so, it generally presents suspicious patterns and other anomalies.

The goal of pestudio is to detect these and to provide indicators about the executable being analyzed in order to ease malware initial assessment. Since the executable file being analyzed is never started, you can inspect any unknown or malicious executable with no risk.


pestudio is free for private non-commercial use only. For commercial use of pestudio, please contact the author, to obtain more details about the License models and prices. The application presented here may not be used for illegal purpose. Any decompilation and/or reverse-engineering of this application and its components is forbidden.

pestudio is delivered as a ZIP file (MD5: 9839902BAD881C9CAD00D83318C746A0). Once the package is decompressed, pestudio does not require any installation nor does it change the system it is running on. pestudio is portable and runs on any Windows Platform. Download pestudio 8.51


pestudio is used in many Emergency Response Teams around the world and presented at many events.


pestudio shows Indicators as a human-friendly result of the analysed image. Indicators are grouped into categories according to their severity. Indicators show the potential and the anomalies of the application being analysed. The classifications are based on XML files provided with pestudio. By editing the XML file, one can customize the Indicators shown and their severity. Among the indicators, pestudio shows when an image is compressed using UPX or MPRESS. pestudio helps you to define the trustworthiness of the application being analysed.

Virus Detection

pestudio can query Antivirus engines hosted by Virustotal for the file being analysed. This feature only sends the MD5 of the file being analysed. This feature can be switched ON or OFF using an XML file included with pestudio. pestudio helps you to determine how suspicious the file being analysed is.


Even a suspicious binary or malware file must interact with the operating system in order to perform its activity. For this to be possible, a certain amount of libraries must be used. pestudio retrieves the libraries and the functions used by the image. pestudio also includes an XML file that is used to blacklist functions (e.g. Registry, Process, Thread, File, ...). The blacklist file can be customized and extended according to your own needs. pestudio shows the intent and purpose of the application analyzed.


Executable files typically not only contain code but also many kinds of data types. Resources sections are commonly used to host different Windows built-in items (e.g. icons, strings, dialogs, menus) and custom data. pestudio analyzes the resources of the file being analysed and detects embedded items (e.g. EXE, DLL, SYS, PDF, CAB, ZIP, JAR, ...). Any item can be separately selected and saved to a file, allowing the possibility of further analysis.


The goal of pestudio is to allow investigators to analyse unknown and suspicious executable files. For this purpose, pestudio can also produce an XML Output Report file documenting the executable file being analysed. The goal of this XML Output Report file is the ability to be utilized by any third-party analysis tool. To better accomplish this goal, an XML Schema will be published soon.


The package you can download not only contains pestudio running as Graphical User Interface (GUI), but it also contains a Command Line Interface (CLI) version of pestudio. Starting pestudio in a prompt mode allows the analysis of executables and the creation of the XML output file in a batch mode.


Considering the general software architecture, pestudio is a consumer of a set of private interfaces provided by the underlying layer. The underlying layer is called PeParser, which is the engine performing the parsing of the Executable files being analysed. This parser has been completely designed and implemented by the author. No third party library or any Windows library is used to parse Executable. As far as the parsing is concerned, this task is made at the RAW level, which has the advantage that the parser can be easily ported to run on other operating systems. The parser provides access to all data of the files being inspected as well as consolidated Information and Notifications that can be also consumed by other products. For this sake, a Software Development Kit (SDK) can be acquired on a license basis. Please contact the author, to get more information about the license models.