Summary | ZeroBOX

file4.bin

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 15, 2021, 10:04 a.m. July 15, 2021, 10:09 a.m.
Size 340.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 363431c16f8b0a0196b67b11adf75ebd
SHA256 7c4ec96ba82e79cb37c6829a595dc09b76568a5dadd82c743c3f9a69c985ad83
CRC32 7C935611
ssdeep 6144:IpWMSmgY0IyFpXjsCEqhp3xuo8Pr7Jjc7wPxfC:lHP7LFVst+0oA71+AC
PDB Path pdmmgree.pdb
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path pdmmgree.pdb
section .rda
section .data1
section .m5Fih
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 0
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 0
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 0
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 0
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 1
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 1
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 1
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 1
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 2
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 2
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 2
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 2
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 3
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 3
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 3
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 3
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 4
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 4
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 4
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 4
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 5
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 5
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 5
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 5
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 6
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 6
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 6
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 6
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 7
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 7
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 7
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 7
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 8
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 8
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 8
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 8
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 9
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 9
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 9
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 9
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 10
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 10
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 10
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 10
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 11
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 11
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4
exception.symbol: file4+0x4c1c0
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311744
exception.address: 0x44c1c0
registers.esp: 1638124
registers.edi: 18
registers.eax: 11
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83 c4 08
exception.symbol: file4+0x4c1c1
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311745
exception.address: 0x44c1c1
registers.esp: 1638124
registers.edi: 18
registers.eax: 11
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00
exception.symbol: file4+0x4c1be
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311742
exception.address: 0x44c1be
registers.esp: 1638124
registers.edi: 18
registers.eax: 12
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0

__exception__

stacktrace:
file4+0x4c227 @ 0x44c227
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: cc cc cc 40 eb f2 8b 04 24 64 a3 00 00 00 00 83
exception.symbol: file4+0x4c1bf
exception.instruction: int3
exception.module: file4.bin
exception.exception_code: 0x80000003
exception.offset: 311743
exception.address: 0x44c1bf
registers.esp: 1638124
registers.edi: 18
registers.eax: 12
registers.ebp: 1638276
registers.edx: 2000290008
registers.ebx: 1638238
registers.esi: 4511460
registers.ecx: 0
1 0 0
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00056060 size 0x000002fc
section {u'size_of_data': u'0x0004c000', u'virtual_address': u'0x00001000', u'entropy': 7.954490361862039, u'name': u'.rda', u'virtual_size': u'0x0004b240'} entropy 7.95449036186 description A section with a high entropy has been found
section {u'size_of_data': u'0x00005000', u'virtual_address': u'0x0004e000', u'entropy': 7.3273448195057185, u'name': u'.data1', u'virtual_size': u'0x00007c01'} entropy 7.32734481951 description A section with a high entropy has been found
entropy 0.964285714286 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

__anomaly__

tid: 2212
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0