Summary | ZeroBOX

Fe36XBk.exe

Themida UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Feb. 11, 2025, 10:40 a.m. Feb. 11, 2025, 10:43 a.m.
Size 2.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b1209205d9a5af39794bdd27e98134ef
SHA256 8d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
CRC32 8F6641EE
ssdeep 49152:q0Xo0Msi8rYRd34LXoM5yZx6BUVNebnnh6XsUf//+FYNi:J5sd3435yLDNyjUmh
Yara
  • themida_packer - themida packer
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
section \x00
section .idata
section
section apuhhdvg
section pzrtjeve
section .taggant
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: fb e9 4e 01 00 00 60 8b 74 24 24 8b 7c 24 28 fc
exception.symbol: fe36xbk+0x3120b9
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 3219641
exception.address: 0x7120b9
registers.esp: 1638276
registers.edi: 0
registers.eax: 1
registers.ebp: 1638292
registers.edx: 9158656
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 3c 24 51 51 b9 c1 54 b7 7f 89 4c 24 04
exception.symbol: fe36xbk+0x725a4
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 468388
exception.address: 0x4725a4
registers.esp: 1638244
registers.edi: 1968898280
registers.eax: 33108
registers.ebp: 3994681364
registers.edx: 4294937572
registers.ebx: 239849
registers.esi: 3
registers.ecx: 4693881
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 89 04 24 c7 04 24 93 5f da 27 89 2c 24 57
exception.symbol: fe36xbk+0x734b9
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 472249
exception.address: 0x4734b9
registers.esp: 1638244
registers.edi: 4696584
registers.eax: 31113
registers.ebp: 3994681364
registers.edx: 1609359050
registers.ebx: 239849
registers.esi: 3
registers.ecx: 2093361587
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 56 be e5 4a 7e 7d e9 22 01 00 00 89 14 24
exception.symbol: fe36xbk+0x73445
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 472133
exception.address: 0x473445
registers.esp: 1638244
registers.edi: 4668460
registers.eax: 31113
registers.ebp: 3994681364
registers.edx: 1259
registers.ebx: 239849
registers.esi: 3
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 53 68 61 20 9b 52 5b 89 d8 5b 2d d0 ae fa
exception.symbol: fe36xbk+0x1f91a3
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2068899
exception.address: 0x5f91a3
registers.esp: 1638240
registers.edi: 4700948
registers.eax: 28332
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 51184397
registers.esi: 6246307
registers.ecx: 6262201
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 39 2f c7 23 e9 da 02 00 00 01 d1 5a f7 d1
exception.symbol: fe36xbk+0x1f8f50
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2068304
exception.address: 0x5f8f50
registers.esp: 1638244
registers.edi: 399593
registers.eax: 0
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 51184397
registers.esi: 6246307
registers.ecx: 6265521
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 c7 04 24 d1 5f ff 7c 50 b8 bd 5c bf 7f 01
exception.symbol: fe36xbk+0x1fa7d7
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2074583
exception.address: 0x5fa7d7
registers.esp: 1638244
registers.edi: 399593
registers.eax: 29599
registers.ebp: 3994681364
registers.edx: 1968622837
registers.ebx: 51184397
registers.esi: 6298324
registers.ecx: 6265521
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 69 5a d2 7f 89 3c 24 c7 04 24 17 ce 3d 3f
exception.symbol: fe36xbk+0x1fa978
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2075000
exception.address: 0x5fa978
registers.esp: 1638244
registers.edi: 50665
registers.eax: 29599
registers.ebp: 3994681364
registers.edx: 1968622837
registers.ebx: 51184397
registers.esi: 6271244
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 c7 04 24 20 56 5e 10 89 04 24 c7 04 24 dd
exception.symbol: fe36xbk+0x2006b2
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2098866
exception.address: 0x6006b2
registers.esp: 1638244
registers.edi: 1259
registers.eax: 26203
registers.ebp: 3994681364
registers.edx: 4294943928
registers.ebx: 6273233
registers.esi: 6319010
registers.ecx: 1969148396
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 19 de ff ff 68 10 90
exception.symbol: fe36xbk+0x2084d3
exception.instruction: in eax, dx
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2131155
exception.address: 0x6084d3
registers.esp: 1638236
registers.edi: 1259
registers.eax: 1447909480
registers.ebp: 3994681364
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 6307541
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: 0f 3f 07 0b 64 8f 05 00 00 00 00 83 c4 04 83 fb
exception.symbol: fe36xbk+0x205828
exception.address: 0x605828
exception.module: Fe36XBk.exe
exception.exception_code: 0xc000001d
exception.offset: 2119720
registers.esp: 1638236
registers.edi: 1259
registers.eax: 1
registers.ebp: 3994681364
registers.edx: 22104
registers.ebx: 0
registers.esi: 6307541
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 81 fb 68 58 4d 56 75 0a c7 85 52 2d 2d 12 01
exception.symbol: fe36xbk+0x205060
exception.instruction: in eax, dx
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2117728
exception.address: 0x605060
registers.esp: 1638236
registers.edi: 1259
registers.eax: 1447909480
registers.ebp: 3994681364
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 6307541
registers.ecx: 10
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 53 e9 b7 fa ff ff 81 e9 f8 9d ff 5f 87 e9
exception.symbol: fe36xbk+0x20ceda
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2150106
exception.address: 0x60ceda
registers.esp: 1638240
registers.edi: 1259
registers.eax: 28874
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 12061827
registers.esi: 10
registers.ecx: 6342605
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 57 89 14 24 89 34 24 c7 04 24 f3 b3 ff 45 89
exception.symbol: fe36xbk+0x20cb7c
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2149244
exception.address: 0x60cb7c
registers.esp: 1638244
registers.edi: 1259
registers.eax: 28874
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 12061827
registers.esi: 10
registers.ecx: 6371479
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 33 0b 00 00 f7 14 24 5a 53 bb d7 11 5b 63
exception.symbol: fe36xbk+0x20c908
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2148616
exception.address: 0x60c908
registers.esp: 1638244
registers.edi: 1358981728
registers.eax: 28874
registers.ebp: 3994681364
registers.edx: 0
registers.ebx: 12061827
registers.esi: 10
registers.ecx: 6345815
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: cd 01 eb 00 6a 00 50 e8 03 00 00 00 20 58 c3 58
exception.symbol: fe36xbk+0x20d642
exception.instruction: int 1
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000005
exception.offset: 2152002
exception.address: 0x60d642
registers.esp: 1638204
registers.edi: 0
registers.eax: 1638204
registers.ebp: 3994681364
registers.edx: 0
registers.ebx: 6346627
registers.esi: 6331681
registers.ecx: 6345815
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b8 6b f5 8c 10 56 52 ba a0 2c fb 6f 89 54 24
exception.symbol: fe36xbk+0x21c20c
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2212364
exception.address: 0x61c20c
registers.esp: 1638244
registers.edi: 4656502
registers.eax: 607422805
registers.ebp: 3994681364
registers.edx: 6408312
registers.ebx: 12062049
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 81 c7 0a e3 a8 7b 51 e9 90 ff ff ff 87 14 24
exception.symbol: fe36xbk+0x21d150
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2216272
exception.address: 0x61d150
registers.esp: 1638240
registers.edi: 6408707
registers.eax: 26125
registers.ebp: 3994681364
registers.edx: 751476874
registers.ebx: 606618964
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 51 54 e9 f7 f9 ff ff 51 e9 6b 04 00 00 89 2c
exception.symbol: fe36xbk+0x21d06b
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2216043
exception.address: 0x61d06b
registers.esp: 1638244
registers.edi: 6411904
registers.eax: 518480
registers.ebp: 3994681364
registers.edx: 751476874
registers.ebx: 606618964
registers.esi: 0
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 55 02 00 00 b9 04 00 00 00 01 ca 8b 0c 24
exception.symbol: fe36xbk+0x223488
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2241672
exception.address: 0x623488
registers.esp: 1638236
registers.edi: 4001093268
registers.eax: 6465404
registers.ebp: 3994681364
registers.edx: 751476874
registers.ebx: 4001103549
registers.esi: 1679084648
registers.ecx: 4294939544
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 e7 16 a0 46 89 3c 24 53 e9 00 00 00 00 89
exception.symbol: fe36xbk+0x22623e
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2253374
exception.address: 0x62623e
registers.esp: 1638236
registers.edi: 6448359
registers.eax: 32607
registers.ebp: 3994681364
registers.edx: 16443729
registers.ebx: 891439740
registers.esi: 1679084648
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 a2 3d c2 27 89 3c 24 c7 04 24 c7 39 bb 7b
exception.symbol: fe36xbk+0x24730d
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2388749
exception.address: 0x64730d
registers.esp: 1638204
registers.edi: 0
registers.eax: 27725
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 2074250637
registers.esi: 6576496
registers.ecx: 6585067
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 3c 24 89 14 24 ba 4a 1b fb 5f e9
exception.symbol: fe36xbk+0x2487ec
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2394092
exception.address: 0x6487ec
registers.esp: 1638204
registers.edi: 6618671
registers.eax: 32729
registers.ebp: 3994681364
registers.edx: 2354875789
registers.ebx: 2177188750
registers.esi: 2177188750
registers.ecx: 4294937900
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 89 1c 24 89 3c 24 c7 04 24 45 ae 9f 76 f7
exception.symbol: fe36xbk+0x249889
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2398345
exception.address: 0x649889
registers.esp: 1638204
registers.edi: 0
registers.eax: 28329
registers.ebp: 3994681364
registers.edx: 6620163
registers.ebx: 36230
registers.esi: 2337128229
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 1c 24 52 53 bb 4e 8e ff 36 e9 7a
exception.symbol: fe36xbk+0x249d9c
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2399644
exception.address: 0x649d9c
registers.esp: 1638204
registers.edi: 715104
registers.eax: 4294942056
registers.ebp: 3994681364
registers.edx: 6620163
registers.ebx: 36230
registers.esi: 2337128229
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 29 ff ff 34 37 ff 34 24 ff 34 24 ff 34 24 ff
exception.symbol: fe36xbk+0x24ad36
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2403638
exception.address: 0x64ad36
registers.esp: 1638204
registers.edi: 6595639
registers.eax: 30121
registers.ebp: 3994681364
registers.edx: 1068732240
registers.ebx: 36230
registers.esi: 6626156
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb b8 40 cd ff 6f c1 e0 05 81 ec 04 00 00 00 89
exception.symbol: fe36xbk+0x24aeda
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2404058
exception.address: 0x64aeda
registers.esp: 1638204
registers.edi: 4294939924
registers.eax: 30121
registers.ebp: 3994681364
registers.edx: 1068732240
registers.ebx: 44777
registers.esi: 6626156
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 a5 69 05 43 e9 1d f3 ff ff c1 ea 08 f7 da
exception.symbol: fe36xbk+0x24c129
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2408745
exception.address: 0x64c129
registers.esp: 1638204
registers.edi: 4294939924
registers.eax: 29230
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 1082769664
registers.esi: 6628918
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 55 c7 04 24 23 d0 19 3b 89 14 24 53 e9 ec 00
exception.symbol: fe36xbk+0x24b5ff
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2405887
exception.address: 0x64b5ff
registers.esp: 1638204
registers.edi: 4294939924
registers.eax: 3261435277
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 1082769664
registers.esi: 6603098
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 70 ff ff ff 31 4c 24 04 e9 39 07 00 00 52
exception.symbol: fe36xbk+0x252ec3
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2436803
exception.address: 0x652ec3
registers.esp: 1638204
registers.edi: 923504013
registers.eax: 30437
registers.ebp: 3994681364
registers.edx: 0
registers.ebx: 6633122
registers.esi: 6587060
registers.ecx: 6628161
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 2d 51 5a df 6e e9 de fb ff ff bb 04 00 00 00
exception.symbol: fe36xbk+0x254e49
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2444873
exception.address: 0x654e49
registers.esp: 1638200
registers.edi: 2130563514
registers.eax: 6636883
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 6647601
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 0d a5 8b 06 89 1c 24 e9 00 06 00 00 89 1c
exception.symbol: fe36xbk+0x254644
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2442820
exception.address: 0x654644
registers.esp: 1638204
registers.edi: 0
registers.eax: 6639654
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 6647601
registers.ecx: 157417
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 d5 04 00 00 87 0c 24 5c 8f 04 24 ff 04 24
exception.symbol: fe36xbk+0x255950
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2447696
exception.address: 0x655950
registers.esp: 1638200
registers.edi: 6641146
registers.eax: 31010
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 1423254724
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 31 f6 ff 34 37 51 b9 73 a4 4e 7f 31 4c 24 04
exception.symbol: fe36xbk+0x255cc7
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2448583
exception.address: 0x655cc7
registers.esp: 1638204
registers.edi: 6672156
registers.eax: 31010
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 1423254724
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 14 24 51 c7 04 24 c7 11 bf 7b ff 34 24
exception.symbol: fe36xbk+0x2557c9
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2447305
exception.address: 0x6557c9
registers.esp: 1638204
registers.edi: 6672156
registers.eax: 31010
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 4294938800
registers.ecx: 84317544
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 13 0c 5b 26 ff 34 24 8b 0c 24 81 c4 04 00
exception.symbol: fe36xbk+0x26b524
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2536740
exception.address: 0x66b524
registers.esp: 1638204
registers.edi: 2130566132
registers.eax: 6731282
registers.ebp: 3994681364
registers.edx: 0
registers.ebx: 3067448717
registers.esi: 59293960
registers.ecx: 4284312574
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 89 34 24 68 9b bd 8d 70 e9 93 fd ff ff 81
exception.symbol: fe36xbk+0x2740d7
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2572503
exception.address: 0x6740d7
registers.esp: 1638204
registers.edi: 6792718
registers.eax: 27901
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 1971716070
registers.esi: 59273367
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 50 e9 d7 00 00 00 8f 04 24 5c 83 c5 04 e9 b0
exception.symbol: fe36xbk+0x273eda
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2571994
exception.address: 0x673eda
registers.esp: 1638204
registers.edi: 6767570
registers.eax: 0
registers.ebp: 3994681364
registers.edx: 9451
registers.ebx: 1971716070
registers.esi: 59273367
registers.ecx: 0
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 fa fd ff ff f7 14 24 e9 79 03 00 00 54 8b
exception.symbol: fe36xbk+0x27afcd
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2600909
exception.address: 0x67afcd
registers.esp: 1638200
registers.edi: 6777925
registers.eax: 6794691
registers.ebp: 3994681364
registers.edx: 2130566132
registers.ebx: 6794267
registers.esi: 4664726
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 89 e3 81 c3 04 00 00 00 e9 e3 fb ff ff be
exception.symbol: fe36xbk+0x27b87b
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2603131
exception.address: 0x67b87b
registers.esp: 1638204
registers.edi: 0
registers.eax: 6797683
registers.ebp: 3994681364
registers.edx: 322689
registers.ebx: 6794267
registers.esi: 4664726
registers.ecx: 1972907132
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 1c 04 00 00 03 1c 24 57 e9 1d 02 00 00 81
exception.symbol: fe36xbk+0x2827fa
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2631674
exception.address: 0x6827fa
registers.esp: 1638200
registers.edi: 0
registers.eax: 30753
registers.ebp: 3994681364
registers.edx: 106
registers.ebx: 6825951
registers.esi: 3988302385
registers.ecx: 107
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 00 00 00 00 52 89 34 24 e9 88 f8 ff ff 8d
exception.symbol: fe36xbk+0x2831ad
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2634157
exception.address: 0x6831ad
registers.esp: 1638204
registers.edi: 0
registers.eax: 844860813
registers.ebp: 3994681364
registers.edx: 106
registers.ebx: 6856704
registers.esi: 3988302385
registers.ecx: 4294939064
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 e9 67 00 00 00 be 3a e1 b6 7d 09 f1 5e c1
exception.symbol: fe36xbk+0x2900bd
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2687165
exception.address: 0x6900bd
registers.esp: 1638204
registers.edi: 2130566132
registers.eax: 31820
registers.ebp: 3994681364
registers.edx: 11
registers.ebx: 189173133
registers.esi: 0
registers.ecx: 6883902
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 51 b9 c1 3c d6 7e 89 cb 59 81 f3 a4 9f 01
exception.symbol: fe36xbk+0x2a59ff
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2775551
exception.address: 0x6a59ff
registers.esp: 1638200
registers.edi: 6603612
registers.eax: 31267
registers.ebp: 3994681364
registers.edx: 395049983
registers.ebx: 16910336
registers.esi: 6603611
registers.ecx: 6969687
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb e9 2b 01 00 00 25 41 da fe 3d c1 e8 03 40 53
exception.symbol: fe36xbk+0x2a5a96
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2775702
exception.address: 0x6a5a96
registers.esp: 1638204
registers.edi: 6603612
registers.eax: 4294938804
registers.ebp: 3994681364
registers.edx: 395049983
registers.ebx: 16910336
registers.esi: 652825685
registers.ecx: 7000954
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 60 00 00 00 52 ba 85 5b f1 76 81 c2 8e
exception.symbol: fe36xbk+0x2a6958
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2779480
exception.address: 0x6a6958
registers.esp: 1638204
registers.edi: 6603612
registers.eax: 31130
registers.ebp: 3994681364
registers.edx: 1933704081
registers.ebx: 16910336
registers.esi: 652825685
registers.ecx: 7003930
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 52 51 b9 de 96 b0 56 52 89 0c 24 e9 c6 02 00
exception.symbol: fe36xbk+0x2a6dee
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2780654
exception.address: 0x6a6dee
registers.esp: 1638204
registers.edi: 4294939088
registers.eax: 607947091
registers.ebp: 3994681364
registers.edx: 1933704081
registers.ebx: 16910336
registers.esi: 652825685
registers.ecx: 7003930
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 53 e9 b0 00 00 00 81 c5 c0 6e 48 44 09 eb 5d
exception.symbol: fe36xbk+0x2a7b6b
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2784107
exception.address: 0x6a7b6b
registers.esp: 1638204
registers.edi: 4294939088
registers.eax: 7004710
registers.ebp: 3994681364
registers.edx: 3909414019
registers.ebx: 1081083744
registers.esi: 4294941464
registers.ecx: 38422554
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 68 11 a5 85 08 e9 43 00 00 00 5e e9 fb 03 00
exception.symbol: fe36xbk+0x2a7fbd
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2785213
exception.address: 0x6a7fbd
registers.esp: 1638204
registers.edi: 7005997
registers.eax: 794096232
registers.ebp: 3994681364
registers.edx: 1784267923
registers.ebx: 4294942952
registers.esi: 4294941464
registers.ecx: 467773697
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: fb 83 ec 04 89 0c 24 e9 b5 fa ff ff 31 cb 59 e9
exception.symbol: fe36xbk+0x2abf30
exception.instruction: sti
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2801456
exception.address: 0x6abf30
registers.esp: 1638204
registers.edi: 7005997
registers.eax: 31575
registers.ebp: 3994681364
registers.edx: 7025977
registers.ebx: 989524099
registers.esi: 4294941464
registers.ecx: 1833324850
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76faf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 413696
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04480000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04490000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04500000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04510000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04520000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04530000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04540000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04550000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04560000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04570000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04580000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04590000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x045a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x045b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x045c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x045d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x045e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00410000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 364544
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00413000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0046c000
process_handle: 0xffffffff
1 0 0
description Fe36XBk.exe tried to sleep 1043 seconds, actually delayed analysis time by 1043 seconds
Time & API Arguments Status Return Repeated

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x0000018c
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x0000018c
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x0000018c
output_buffer: 
1 1 0

DeviceIoControl

input_buffer:
control_code: 475228 (IOCTL_DISK_GET_LENGTH_INFO)
device_handle: 0x0000018c
output_buffer: 
1 1 0
section {u'size_of_data': u'0x00064a00', u'virtual_address': u'0x00001000', u'entropy': 7.936555243798331, u'name': u' \\x00 ', u'virtual_size': u'0x0006d000'} entropy 7.9365552438 description A section with a high entropy has been found
section {u'size_of_data': u'0x001a8c00', u'virtual_address': u'0x00312000', u'entropy': 7.9522524531160474, u'name': u'apuhhdvg', u'virtual_size': u'0x001a9000'} entropy 7.95225245312 description A section with a high entropy has been found
entropy 0.994322214336 description Overall entropy of this PE file is high
process system
file \??\SICE
file \??\SIWVID
file \??\NTICE
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: Registry Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: #0
window_name: File Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: #0
window_name: Process Monitor - Sysinternals: www.sysinternals.com
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: Filemonclass
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: Regmonclass
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 e9 19 de ff ff 68 10 90
exception.symbol: fe36xbk+0x2084d3
exception.instruction: in eax, dx
exception.module: Fe36XBk.exe
exception.exception_code: 0xc0000096
exception.offset: 2131155
exception.address: 0x6084d3
registers.esp: 1638236
registers.edi: 1259
registers.eax: 1447909480
registers.ebp: 3994681364
registers.edx: 22104
registers.ebx: 1969033397
registers.esi: 6307541
registers.ecx: 20
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Themida.4!c
tehtris Generic.Malware
Cynet Malicious (score: 99)
CAT-QuickHeal Trojanspy.Phpw
Skyhigh BehavesLike.Win32.Themida.vc
ALYac Gen:Variant.Zusy.580184
Cylance Unsafe
VIPRE Gen:Variant.Zusy.580184
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Zusy.580184
K7GW Trojan ( 00587f0f1 )
K7AntiVirus Trojan ( 00587f0f1 )
Arcabit Trojan.Zusy.D8DA58
VirIT Trojan.Win32.Genus.XNN
Symantec Trojan Horse
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.Themida.HZB
APEX Malicious
Avast Win32:BootkitX-gen [Rtk]
Kaspersky Trojan.MSIL.BypassUAC.xr
Alibaba Trojan:MSIL/BypassUAC.fc68d6d4
MicroWorld-eScan Gen:Variant.Zusy.580184
Rising Trojan.Agent!1.127FB (CLASSIC)
Emsisoft Gen:Variant.Zusy.580184 (B)
F-Secure Trojan.TR/Crypt.TPM.Gen
DrWeb Trojan.Pitou.17
McAfeeD Real Protect-LS!B1209205D9A5
Trapmine malicious.high.ml.score
CTX exe.trojan.themida
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.b1209205d9a5af39
Google Detected
Avira TR/Crypt.TPM.Gen
Antiy-AVL Trojan[Packed]/Win32.Themida
Kingsoft MSIL.Trojan.BypassUAC.xr
Gridinsoft Trojan.Heur!.038120A1
Microsoft Trojan:Win32/Caynamer.A!ml
GData Gen:Variant.Zusy.580184
Varist W32/Themida.CT.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R691503
McAfee Artemis!B1209205D9A5
DeepInstinct MALICIOUS
VBA32 TrojanSpy.Phpw
Ikarus Trojan.Win32.Themida
Panda Trj/Chgt.AD
Zoner Probably Heur.ExeHeaderL
Tencent Malware.Win32.Gencirc.1431df81