Skip to content

Export page to PDF
Aliases: Virus:Win32/Parite.B (Microsoft), W32.Pinfi (Symantec), W32/Pate.b (McAfee), Virus.Win32.Parite.b (Kaspersky), W32/Parite-B (Sophos), Win32.Parite.b (Sunbelt)
Malware type: File infector
Destructive: No
Platform: Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Encrypted: No
In the wild: Yes


Infection Channel: Infects files

This malware was involved in an attack targeting Banco de Brasil users during May 2013. It claimed itself to be a customized online banking browser that would allow users to access their accounts much more easily. Users with systems affected by this malware may find their online banking accounts compromised.

To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.

This file infector may be downloaded by other malware/grayware from remote sites.

It infects by appending its code to target host files.

It does not have any backdoor routine.

It does not have any downloading capability.

It does not have any information-stealing capability.

Technical Details

File size: Varies
File type: EXE
Memory resident: Yes
Initial samples received date: 05 Jan 2001
Payload: Drops files

Arrival Details

This file infector may be downloaded by the following malware/grayware from remote sites:



This file infector adds the following mutexes to ensure that only one of its copies runs at any one time:

  • Residented

Other System Modifications

This file infector adds the following registry keys as part of its installation routine:


File Infection

This file infector infects the following file types:

  • .EXE
  • .SCR

It infects by appending its code to target host files.

Backdoor Routine

This file infector does not have any backdoor routine.

Dropping Routine

This file infector drops the following files:

  • %User Temp%\{random file name}.tmp - detected as PE_PARITE.A-O

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

Download Routine

This file infector does not have any downloading capability.

Information Theft

This file infector does not have any information-stealing capability.

Other Details

This file infector does the following:

  • It makes use of random port in order to access network shares. It then continues its infection routine in its accessed shares.
  • It may also arrive as an email file (EML) file that contains the malware executable in Base-64 format. In this form, this file infector executes when the malicious EML file is opened. Once opened, it searches for .HTM or .HTML files on the infected system with the strings "README" in their file names. Once found, it drops a copy of the .EML file into the folder where the infected .HTML file is found. The infected HTML file is detected by Trend Micro as JS_NIMDA.A.
  • Adds a script line to the infected HTML file to execute the embedded malicious .EML file when the infected HTML file is opened and viewed. This action guarantees continuous infection and increases security risk of the infected system.


It does not have rootkit capabilities.

It does not exploit any vulnerability.


Minimum scan engine: 8.900
VSAPI OPR Pattern Version: 5.883.00
VSAPI OPR Pattern Release Date: 01 Apr 2008

Step 1


Step 2

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 3

Remove the malware/grayware file that dropped/downloaded PE_PARITE.A

Step 4

Remove the malware/grayware file dropped/downloaded by PE_PARITE.A

Step 5

Delete this registry key

[ Learn more ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

  • In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
    • PINF

Step 6

Scan your computer with your Trend Micro product to delete files detected as PE_PARITE.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Did this description help? Tell us how we did.
Analysis By: Automation
Modified By: Christopher Daniel So

Connect with us on