Summary | ZeroBOX

defi.exe

Raccoon Stealer NPKI OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 24, 2021, 6:50 p.m. June 24, 2021, 7:01 p.m.
Size 569.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ee17b850393e1f3cf0704a408378d874
SHA256 847a6ee401f8fabccd33c0e7d72e67f26423ae5cc085d6df9ba575720aec784d
CRC32 6E0439D7
ssdeep 12288:YrE9g/lgChDGRgyQWTLJ8Qb/Zj6vTYnwfuRVdQmwgfo:xg/lXqRj6cnwf0VdQ
PDB Path C:\jacipomejanaki\36-tiharaxo100_miza\luco_49.pdb
Yara
  • NPKI_Zero - File included NPKI
  • PE_Header_Zero - PE File Signature
  • Raccoon_Stealer_1_Zero - Raccoon Stealer
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\jacipomejanaki\36-tiharaxo100_miza\luco_49.pdb
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_futurama@4+0x477 defi+0x6e0e7 @ 0x46e0e7
_futurama@4+0x13ea defi+0x6f05a @ 0x46f05a
_regulmoto@4-0x6c59b defi+0x16b5 @ 0x4016b5
_regulmoto@4-0x6c711 defi+0x153f @ 0x40153f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1629892
registers.edi: 10616832
registers.eax: 4294967288
registers.ebp: 1629936
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 10616832
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 327680
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a3c000
process_handle: 0xffffffff
1 0 0
name RT_VERSION language LANG_LATVIAN filetype data sublanguage SUBLANG_DEFAULT offset 0x00524780 size 0x00000100
section {u'size_of_data': u'0x00076c00', u'virtual_address': u'0x00001000', u'entropy': 7.7435978563145555, u'name': u'.text', u'virtual_size': u'0x00076bd0'} entropy 7.74359785631 description A section with a high entropy has been found
entropy 0.835532102023 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

__anomaly__

tid: 1908
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.46507570
FireEye Generic.mg.ee17b850393e1f3c
CAT-QuickHeal Trojan.Multi
ALYac Trojan.GenericKD.46507570
Malwarebytes Trojan.Crypt.Generic
VIPRE Trojan.Win32.Generic!BT
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Trojan.GenericKD.46507570
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Generic.D2C5A632
Cyren W32/Kryptik.EJB.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HLKK
APEX Malicious
Avast Win32:PWSX-gen [Trj]
ClamAV Win.Trojan.Mokes-9872775-0
Kaspersky HEUR:Trojan-PSW.Win32.Racealer.gen
Alibaba TrojanPSW:Win32/Glupteba.cb47b545
AegisLab Trojan.Multi.Generic.4!c
Rising Trojan.Kryptik!1.D75E (CLASSIC)
Ad-Aware Trojan.GenericKD.46507570
Sophos ML/PE-A + Troj/Kryptik-TR
DrWeb Trojan.Siggen12.51016
TrendMicro TROJ_GEN.R01FC0DFK21
McAfee-GW-Edition BehavesLike.Win32.Generic.hc
MaxSecure Trojan.Malware.300983.susgen
Emsisoft Trojan.GenericKD.46507570 (B)
Ikarus Win32.Outbreak
Jiangmin Trojan.PSW.Racealer.cln
Avira TR/AD.StellarStealer.jdnts
MAX malware (ai score=85)
Gridinsoft Trojan.Win32.Packed.lu!heur
Microsoft Trojan:Win32/Azorult.RM!MTB
ZoneAlarm HEUR:Trojan-PSW.Win32.Racealer.gen
GData Win32.Trojan.BSE.136Z9KJ
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.MalPE.R426260
Acronis suspicious
McAfee Packed-GDT!EE17B850393E
VBA32 Trojan.Azorult
Panda Trj/GdSda.A
TrendMicro-HouseCall TROJ_GEN.R01FC0DFK21
Yandex Trojan.Kryptik!RM4fzZ6SXsA
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_99%
Fortinet W32/Kryptik.TR!tr