Static | ZeroBOX

PE Compile Time

2021-12-03 22:32:12

PE Imphash

88f775776887c3897bf5575da16525a3

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00000b7e 0x00000c00 6.00344161105
.rdata 0x00002000 0x00000868 0x00000a00 4.2030137549
.data 0x00003000 0x000007a8 0x00000600 1.000797713
.reloc 0x00004000 0x00000174 0x00000200 4.97471727199
.gda 0x00005000 0x00001000 0x00000800 6.37465136835

Imports

Library KERNEL32.dll:
0x402000 LoadLibraryA
0x402004 GetProcAddress
0x402008 WaitForSingleObject
0x40200c CreateEventA
0x402010 Sleep
0x402014 ExitProcess
0x402018 CreateThread
0x40201c VirtualAlloc
0x402020 GetCurrentProcessId
0x402024 GetCurrentThreadId
0x402028 GetTickCount
0x402030 GetModuleHandleA
0x40203c GetCurrentProcess
0x402040 TerminateProcess
0x402048 InterlockedExchange
Library msvcrt.dll:
0x40207c _controlfp
0x402080 exit
0x402084 ?terminate@@YAXXZ
0x402088 __set_app_type
0x40208c _initterm
0x402090 __p__fmode
0x402094 __p__commode
0x402098 __setusermatherr
0x40209c _amsg_exit
0x4020a0 _XcptFilter
0x4020a4 _exit
0x4020a8 _cexit
0x4020ac __getmainargs
0x4020b4 ??3@YAXPAX@Z
0x4020b8 __CxxFrameHandler3
0x4020bc ??2@YAPAXI@Z
0x4020c0 memset
0x4020c4 memcpy
Library WS2_32.dll:
0x402054 WSAStartup
0x402058 gethostbyname
0x40205c socket
0x402060 recv
0x402064 WSACleanup
0x402068 send
0x40206c htons
0x402070 connect
0x402074 closesocket

!This program cannot be run in DOS mode.
`.rdata
.reloc
GETSERVER
.text$mn
.text$x
.idata$5
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIY
.CRT$XIZ
.rdata
.rdata$r
.rdata$sxdata
.rdata$voltmd
.rdata$zzzdbg
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$rs
CloseHandle
ResetEvent
WaitForSingleObject
CreateEventA
ExitProcess
CreateThread
VirtualAlloc
KERNEL32.dll
memcpy
memset
??2@YAPAXI@Z
__CxxFrameHandler3
msvcrt.dll
??3@YAXPAX@Z
??1type_info@@UAE@XZ
__getmainargs
_cexit
_XcptFilter
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
WS2_32.dll
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
43.249.193.233
Default
WinHelp32
Windows Help System
Windows Help System for X32 windows desktop
C:\windows
WinHelp32.exe
.?AVCDwonKey@@
1"1'1I1N1W1\1i1z1
2%20262
33&3-343;3B3J3R3Z3f3o3t3z3
6H6k6x6
7X7d7m7t7
8#898V8n8}8
96:E:^:d:
;;%;+;u;
44484T4X4
LoadLibraryA
GetProcAddress
@=~HCl
6IL;Bz\
) Fpdb0
N]g'Sq,
q">46:
tl&/}2
h+b;_pJ
G4K^#}
ApB,5T{
mcMLj8
.$qS$P
~~8<!w
+'I4\Q
*KZB_a
}yQv`A
:W)@0K
&],2qpn
Pf/pEc<
sQiT2Y
+FiBz%i
2X (u_
uS7~ziD
BVm3X@&
1)L~n9
4}uAZ.
N;.0)6
]tt"B9
NPvyWJ
Z^}@u:L
-EjE]'
o`[O+7
(Khzo@w
z=%<Fz
P@mrXX
/j:0},K
0rnp"
YjKaPc
iqU69<9
v9(4 lB
AK`=<>
+b5m(B
2=b!%+
LZrJ07
.@4lh$
]06.iY
P$TVA%
Ku=6h/
iP]BPY1L
vxC"d[z`
z~SN'
bD]76bBL
8:I@:P
MaUPu.Z
'fI69=
10;un=N;E
pI9A@'n!
mUhCOO
U2]l4A
#S5#B|
RIv.ac
!}m@}]
[b]pAc
*wi%i>L3
:ah?@f
:,.Rp~:
3jsjs7
D(~emU
N$g]O_
'[~D-P
j:d9Vl
*4'ZIZ
td2A">
@WC# cFS
=4y'F+Pro
=P*eTzp|
|B;s0
B4faCZa
OuYJY=
U$I,G8
Cf/\vI
PZvhwi
V0@nz3
!IEh2a
72ml=Qj
wXx=s;
E!{,9Tf
EcJ@F69+
p,w?DU
*Fh]q$
@4?lXz
{\3j#s
.L)=Ad*
Bzz>2T+)
CUHdJ/f
(.Aj!=
S-6'pH
G9oaS\
,.G?Qmb8
G=69g|"
?*~G:@
1sjedW
ud8ue
I5DB#'
dj\0H?{
AjW$hI]
zEqQ6.
Yh6U"
SqcJ=
W@'r)Y
9073)HH0t
WNd[0&
i>*)8hl1
!P)[T|bD
+\7%bGu
)#<mO'
IB oUN)
79RgHNV
aK-*4&
A8mO`X
I0O8VC
I!AC\,h
MCN@.
2kT@gp~
cK9=)A2
^3.\C
Gz3-lJ
j)BeEb%R
)S|Bq
RHO3W<
tPk8h6
t<).M=
"SFJU&
D\u9>u0
1^;.y3
{%Dfev
B7R !)
ce($<Ak@"I
pW0L`6!g
EHJ0S40cW
&c\ -jgm
<jiD^d
w/)n#W
tC5@)C
a&Rub&$
o0-UF
,9DGd$
I1]Vg{u
Q@2Xj<
pb#991
35TMMv`
%IR34&`
a|-cyL
&y"T6P
_>@c^C
bUxS-hI+
MAl8/F
R"4D<D!T
VT)3s.
nqtTX(
QL(xj9d
TmyL]3
pskv3
DgO+ _E4
2_8rvF
s8`)sR
aDcqqF
CCT'T4
%XlgC\
Pe?r69k
I;7ht1
%6@&PRQ
Mx!`$5
Sq]8L0
:pxxAp
]<a2w,
EjD+^4J[
zO{I95
`4hBG~
IZte:Nv`
,PoiAs
9bO"K;=
bU;c$O
[3gH%6
?UumWH
Ln3q$K/
"_'f9PK
Eh?Zb
Jnm9Ck
G2%IF%SC
M>b/Z$
#)@$uE#}qN~
DC$Fayt<
jFa2xH
j`He4I=
%~?9uW
K0-Rb1!#S0
~Pxww+/
zsPKbRX
`I^pxr
1Za*Rv
2RHdky
v-U0_Ef
}FOlJ)
:p8(b!
a%#`v8
q;ojK\X
:i/(8i.
t0W'kd
y@KR4|
,LZb_Q
L^5HOSI^G_'
tV2WtVO
O$4Bp:
h#%J5+
Y1C$B/
4-+|!
+X1GaR_5P
J-qJ&7
a.4iqK
*PYV5n<
jo,1L9k
Wi6@d!n
"u%C^#
eH+Q R
rz"W#@
N<+v*B
t5-!#WA
\Vj\re
L%t?9?
-TpBY{
Jzdd~
q,8D-yl
b2e<Yz
5$cfO9=XXF:
D.pxyZ
@EJWE@
V[uH41
(Di2%@{t4
l3964|
RWE<9dA
"UQ^Bt
/vLPG(
Iu:TfT
79n),v
jHGl&0}
4<<0"$
#dIR#
+a`?l\s
kiTO~]
!gH)s}r
VCDX-*
IQA;lF>E
epz2|#J
BKa8&1m
s!Cnp>;k
5nN_cg
"8r.E"v
x'tzsF;
"H6d]4
w~KvT
Mpw9k{w7
Ug/RjD
JlG6E;
9RMc?a
KG$`(];:
?S&a"4
B| daI
],k#]}^
Ves&={
hWEE2al
p)d@|7
9CP-J|o
8FwH[(
dA[7oTW&
#C)bU`RG
H!~HwW
ye4Sw?
&;e,^]c
dzQ|s*N
/^=rC%
S22jZho
DRCPvq
3;U>'V
zD!dh5
N4|T(u
zJJq>>
]?tv<>@
9:HNwE
0L{#LAX
-56BHi
?!HJ}90
1[d@uk
a>0B=n
0|wIHi
6@a#/C
"'jk "
{r02*!6$
9a~nM.
mc-S;l
G`g>*]wj
VAVqY]h
~Gc,u;
CcGm),
uWE$FKL`
e>V<:E
dIn%8Ef+
J5HD9
!u/Z}Z
=o9#4%G
NgEj2!
L8$F#:
j#`N*9
?D,]1f
uajgio
U%d7]3
E.oh!1Cr*a
.zwcha
Fphbv2
oIY<G_B
~5+|>op^
v6}8v2
s-+IwC;
258@4U
H*FCC3
qB~Nuo
[Dt5b26MT
P\wE];4
AEvho'lj
HXahq
s` 5CB
]#!\mdb
[?1)6?3w4
L-V!~;U&T
jpV'C.%_
I[)mQ|fNM/d
R?WtD
F$AD,;"][
@f1]cp
(BI=-PB
`Z!WzNI
,kCZ?0j
\i-$Ig:
$-5@7f
N[)V4%
oF$&TKY
0)9XJ;R
TqRf_[%p
m{Jv-G
yUiY@P-"Sh
G}{e,wFc
X{Fxi(
Xt#=Yt
ahxTyFyj
PZqJX*
0@pK&CA
)1wB<^don
2O"E@0?9
``IO5iD6 j
w#SVcQ%
^SY$@`
\#-_RU
gDK9L=@
QmsK2p
L8{TfI
4=Q;SWR
Gcg$)T
0(\SS.P
1C3 %*
fs`<>3
KSX=[G
#m0x0:
F0%TO?
T[_{Z+
\:o+Cj
0g0zTb0
8KHikC4
x8<?QO
Ckl31j
+T8J3D
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
FireEye Generic.mg.36c087cb423663c9
CAT-QuickHeal W32.Perite.A
McAfee W32/Pate.c
Malwarebytes Malware.AI.2980409795
Zillya Virus.Parite.Win32.2
Sangfor Virus.Win32.Parite.B
K7AntiVirus Virus ( 00001b711 )
BitDefender Win32.Parite.C
K7GW Virus ( 00001b711 )
CrowdStrike win/malicious_confidence_100% (D)
Baidu Win32.Virus.Parite.d
VirIT Win32.Parite.H
Cyren W32/Parite.C
Symantec W32.Pinfi.B
ESET-NOD32 Win32/Parite.C
APEX Malicious
Paloalto Clean
ClamAV Heuristics.W32.Parite.B
Alibaba Clean
NANO-Antivirus Virus.Win32.Parite.bysj
ViRobot Win32.Parite.C
MicroWorld-eScan Win32.Parite.C
Rising Malware.Heuristic!ET#88% (RDMK:cmRtazoixqeM0mEvccfTKoTxDUaH)
Ad-Aware Win32.Parite.C
Sophos ML/PE-A + W32/Parite-C
Comodo Virus.Win32.Parite.gen@1dp8c4
F-Secure Clean
DrWeb Win32.Parite.3
VIPRE Win32.Parite.c (v)
TrendMicro PE_PARITE.A
McAfee-GW-Edition BehavesLike.Win32.Generic.cc
CMC Clean
Emsisoft Win32.Parite.C (B)
SentinelOne Static AI - Malicious PE
Jiangmin Win32/Parite.c
MaxSecure Virus.Parite.C
Avira W32/Parite
Antiy-AVL Virus/Win32.Parite.c
Kingsoft Clean
Gridinsoft Trojan.Heur!.03002201
Arcabit Win32.Parite.C
SUPERAntiSpyware Clean
GData Win32.Parite.C
AhnLab-V3 Win32/Parite
Acronis Clean
BitDefenderTheta AI:FileInfector.5786848B0E
ALYac Win32.Parite.C
MAX malware (ai score=83)
VBA32 Virus.Parite.C
Zoner Clean
TrendMicro-HouseCall PE_PARITE.A
Tencent Virus.Win32.Parite.a
Yandex Win32.Parite.C
TACHYON Virus/W32.Parite.C
eGambit Clean
Fortinet W32/Parite.C
Webroot Clean
Cybereason malicious.b42366
Panda W32/Parite.A
No IRMA results available.