N/A | |
PE32 executable for MS Windows (console) Intel 80386 32-bit | 139264 |
N/A | |
c477136400840d2f7f147873b83b7e3c | |
26a9cdb3f024c911c5168e8c3421dbbf86f896da | |
bb53443468db80a35a0a7924468b6a65334393cdf6cfb05a403f6a4e12f4dfb8 | |
N/A | |
N/A | |
N/A | |
N/A | |
PE32 | |
PsExec | |
N/A | |
N/A | |
136 kB | |
Intel 386 or later, and compatibles | |
Windows NT 32-bit | |
40960 | |
4.0 | |
0x411f | |
0x003f | |
6.0 | |
N/A | |
N/A | |
1.43 | |
184320 | |
Remote process launcher | |
1.43.0.0 | |
Sysinternals PsExec | |
N/A | |
Sysinternals | |
application/octet-stream | |
Unicode | |
N/A | |
English (U.S.) | |
1.43.0.0 | |
Win32 EXE | |
psexec.c | |
Copyright © 2001-2003 Mark Russinovich | |
Windows command line | |
Executable application | |
0.0 | |
(none) | |
4.0 | |
1.43 | |
Source: |
Agnitum | HackTool.RemoteStartProcess!q9e4CgBtmCA |
AntiVir | SPR/RemoteStartProcess.A.1 |
Avast | Win32:PUP-gen [PUP] |
BitDefender | Application.Psexec.Z |
Commtouch | W32/Tool.QSBZ-3586 |
Comodo | UnclassifiedMalware |
Emsisoft | Riskware.NetTool.Win32.RemoteStartProcess.a (A) |
F-Prot | W32/HackTool.COV |
F-Secure | Application.Psexec.Z |
Fortinet | Riskware/ProcLaunch |
GData | Application.Psexec.Z |
K7AntiVirus | Unwanted-Program |
Kaspersky | not-a-virus:NetTool.Win32.RemoteStartProcess.a |
Kingsoft | Win32.HackTool.RemoteStartP.a.(kcloud) |
McAfee | RemAdm-ProcLaunch |
McAfee-GW-Edition | RemAdm-ProcLaunch |
MicroWorld-eScan | Application.Psexec.Z |
NANO-Antivirus | Riskware.Win32.PsExec.bvvgr |
Panda | Application/Psexec.A |
Rising | Trojan.Win32.Generic.1246AB4C |
Sophos | PsExec |
TheHacker | Aplicacion/RemoteStartProcess.a |
VIPRE | PsExec (not malicious) |
ViRobot | NetTool.RemoteStartProcess.139264 |
eSafe | Win32.SPRRemoteStart |
nProtect | Abuse-Worry/W32.Psexec.139264 |