Static | ZeroBOX

PE Compile Time

2022-05-16 21:30:47

PDB Path

C:\Users\woody\Documents\Visual Studio 2010\Projects\pcap\Release\pcap.pdb

PE Imphash

36cb6f1addd942c545febbc134f07815

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00000afa 0x00000c00 5.76692526287
.rdata 0x00002000 0x00000afc 0x00000c00 4.40871718749
.data 0x00003000 0x00000384 0x00000200 0.352759488216
.rsrc 0x00004000 0x000001b4 0x00000200 5.09797908882
.reloc 0x00005000 0x00000206 0x00000400 3.31987112819

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00004058 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US ASCII text, with CRLF line terminators

Imports

Library KERNEL32.dll:
0x402014 GetProcessHeap
0x402018 OpenProcess
0x40201c FormatMessageW
0x402020 GetCurrentProcess
0x402024 LocalLock
0x40202c CloseHandle
0x402030 LocalFree
0x402034 HeapAlloc
0x402038 CreateProcessW
0x40203c GetLastError
0x402044 GetCurrentProcessId
0x402048 GetCurrentThreadId
0x40204c GetTickCount
0x402054 DecodePointer
0x402058 IsDebuggerPresent
0x402064 TerminateProcess
0x402068 EncodePointer
0x40206c HeapSetInformation
0x402078 Sleep
0x40207c InterlockedExchange
Library ADVAPI32.dll:
0x402004 OpenProcessToken
Library MSVCR100.dll:
0x402084 _fmode
0x402088 __set_app_type
0x40208c _crt_debugger_hook
0x402090 ?terminate@@YAXXZ
0x402094 _unlock
0x402098 __dllonexit
0x40209c _lock
0x4020a0 _onexit
0x4020a8 _invoke_watson
0x4020ac _controlfp_s
0x4020b0 _commode
0x4020b4 __setusermatherr
0x4020b8 _initterm_e
0x4020bc _initterm
0x4020c0 __winitenv
0x4020c4 exit
0x4020c8 _XcptFilter
0x4020cc _exit
0x4020d0 _cexit
0x4020d4 __wgetmainargs
0x4020d8 _amsg_exit
0x4020dc _putws
0x4020e0 wprintf
0x4020e4 _wtoi
0x4020e8 _configthreadlocale
0x4020ec memset

!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
dSVWjD3
T$ Rh@$@
C:\Users\woody\Documents\Visual Studio 2010\Projects\pcap\Release\pcap.pdb
DeleteProcThreadAttributeList
CreateProcessW
HeapAlloc
GetCurrentProcess
UpdateProcThreadAttribute
GetProcessHeap
OpenProcess
FormatMessageW
GetLastError
LocalLock
InitializeProcThreadAttributeList
CloseHandle
LocalFree
KERNEL32.dll
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ADVAPI32.dll
wprintf
_putws
MSVCR100.dll
_amsg_exit
__wgetmainargs
_cexit
_XcptFilter
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_onexit
_except_handler4_common
_invoke_watson
_controlfp_s
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
EncodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
memset
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
0-070=0J0g0x0
0%1-1?1I1S1c1~1
1$22272c2m2r2
3"3)3/34393>3C3I3Q3e3r3
4*4;4A4H4\4a4g4o4u4{4
5)555;5D5J5O5T5Y5`5f5x5
6"6.676<6B6L6U6`6l6q6
7 737H7S7i7
92:U:b:n:v:~:
4L5P5p5
@%s: %s
SeDebugPrivilege
SelectMyParent v0.0.0.1: start a program with a selected parent process
Source code put in public domain by Didier Stevens, no Copyright
https://DidierStevens.com
Use at your own risk
usage: SelectMyParent program pid
Invalid pid
HeapAlloc error
InitializeProcThreadAttributeList error
OpenProcess error
UpdateProcThreadAttribute error
CreateProcess error
Process created: %d
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Clean
Cylance Clean
Zillya Clean
Sangfor Clean
K7AntiVirus Clean
Alibaba Clean
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Clean
Paloalto Clean
Symantec Clean
Elastic Clean
ESET-NOD32 Clean
APEX Clean
Avast Clean
Cynet Clean
Kaspersky Clean
BitDefender Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Clean
Tencent Clean
TACHYON Clean
Sophos Clean
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
McAfeeD Clean
Trapmine Clean
FireEye Clean
Emsisoft Clean
SentinelOne Clean
GData Clean
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Clean
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Clean
MAX Clean
VBA32 Clean
Malwarebytes Clean
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Clean
Yandex Clean
Ikarus Clean
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
BitDefenderTheta Clean
AVG Clean
DeepInstinct Clean
CrowdStrike Clean
alibabacloud HackTool:Win/SelectMyParent
No IRMA results available.