Summary | ZeroBOX

file3s.exe

Raccoon Stealer OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 June 21, 2021, 12:37 p.m. June 21, 2021, 12:52 p.m.
Size 772.4KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 856cf6ed735093f5fe523f0d99e18424
SHA256 f47a0c643ec5aa9d2b0302391d39bedfd675abd8892d5a2bd18b66fc303f66f7
CRC32 2A2A2D58
ssdeep 24576:0NWmiLgJDj907ktt4lyWi7tzayFhhmWaKlHhZx+:F8Jvelyx7tzaiPmvSBZx+
PDB Path C:\haguxu-7\gafoyeyi\23 cevecovad-kaciw25\tedibuxiyal.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Raccoon_Stealer_1_Zero - Raccoon Stealer
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\haguxu-7\gafoyeyi\23 cevecovad-kaciw25\tedibuxiyal.pdb
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 file3s+0x9f497 @ 0x49f497
_futurama@4+0x1460 file3s+0xa0480 @ 0x4a0480
_futurama@4-0x9d93b file3s+0x16e5 @ 0x4016e5
_futurama@4-0x9dab1 file3s+0x156f @ 0x40156f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629836
registers.edi: 3080192
registers.eax: 4294967288
registers.ebp: 1629880
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 3080192
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 4636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 528384
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a10000
process_handle: 0xffffffff
1 0 0
name RT_VERSION language LANG_LATVIAN filetype data sublanguage SUBLANG_DEFAULT offset 0x005557c4 size 0x00000100
section {u'size_of_data': u'0x000a8000', u'virtual_address': u'0x00001000', u'entropy': 7.856611966267036, u'name': u'.text', u'virtual_size': u'0x000a8000'} entropy 7.85661196627 description A section with a high entropy has been found
entropy 0.876712328767 description Overall entropy of this PE file is high
host 172.217.25.14
Time & API Arguments Status Return Repeated

__anomaly__

tid: 9076
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.37126264
ALYac Trojan.GenericKD.46508750
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Win32/Glupteba.1bf9e311
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Generic.D2C5AACE
Cyren W32/Kryptik.EJB.gen!Eldorado
ESET-NOD32 a variant of Win32/Kryptik.HLKO
APEX Malicious
Paloalto generic.ml
ClamAV Win.Malware.Generic-9873003-0
Kaspersky HEUR:Trojan.Win32.Zenpak.gen
BitDefender Trojan.GenericKD.37126264
Avast Win32:PWSX-gen [Trj]
Ad-Aware Trojan.GenericKD.37126264
Emsisoft Trojan.GenericKD.46508750 (B)
DrWeb Trojan.MulDrop17.51738
McAfee-GW-Edition BehavesLike.Win32.Generic.bc
FireEye Generic.mg.856cf6ed735093f5
Sophos ML/PE-A + Troj/Kryptik-TR
SentinelOne Static AI - Malicious PE
Jiangmin Trojan.PSW.Racealer.cln
Webroot W32.Trojan.Gen
eGambit Unsafe.AI_Score_99%
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Packed.lu!heur
Microsoft Trojan:Win32/Glupteba.QO!MTB
AegisLab Trojan.Win32.Malicious.4!c
GData Win32.Trojan.BSE.136Z9KJ
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.MalPE.C4529626
McAfee Packed-GDT!856CF6ED7350
MAX malware (ai score=80)
Malwarebytes Trojan.MalPack.GS
Rising Trojan.Kryptik!1.D75E (CLASSIC)
Ikarus Trojan.Win32.Ranumbot
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/GenKryptik.FGQJ!tr
BitDefenderTheta Gen:NN.ZexaF.34758.WuX@aO2shVpI
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.46ac52
Panda Trj/GdSda.A