Summary | ZeroBOX

vbc.exe

Raccoon Stealer Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 9, 2021, 10:24 a.m. July 9, 2021, 10:26 a.m.
Size 314.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ead27a4a9505a3008c0e7c93f92c4a16
SHA256 74498a0a179b34e0d1e4c278deb7563129cb30363094d50b3c4f579a6a967b62
CRC32 A016EFD5
ssdeep 6144:o/19Es1p0QJUMCnjy+QpxxKSuYarh8qbPRt68WV7:o/QwJUMCnjyJz6rWmRk8Y
PDB Path C:\gobuz-x.pdb
Yara
  • Raccoon_Stealer_1_Zero - Raccoon Stealer
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\gobuz-x.pdb
resource name AFX_DIALOG_LAYOUT
resource name LOY
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0

__exception__

stacktrace:
_vsnprintf+0xa9 strncpy_s-0x79 ntdll+0x79e31 @ 0x77419e31
GetProfileStringW+0x5b74 EnumResourceNamesW-0x40041 kernel32+0x43120 @ 0x75763120
_hockey@4+0x4ef vbc+0x36681 @ 0x436681
_hockey@4+0x1537 vbc+0x376c9 @ 0x4376c9
_kimonu_Lalacer_cuf@8-0x2ecc3 vbc+0x74c6 @ 0x4074c6
_kimonu_Lalacer_cuf@8-0x2ee3a vbc+0x734f @ 0x40734f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 80 78 07 05 0f 84 64 8a 01 00 f6 40 07 3f 0f 84
exception.symbol: _vsnprintf+0xd0 strncpy_s-0x52 ntdll+0x79e58
exception.instruction: cmp byte ptr [eax + 7], 5
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 499288
exception.address: 0x77419e58
registers.esp: 1621936
registers.edi: 5832704
registers.eax: 4294967288
registers.ebp: 1621980
registers.edx: 0
registers.ebx: 0
registers.esi: 0
registers.ecx: 5832704
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005ac000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00036e00', u'virtual_address': u'0x00001000', u'entropy': 7.046310030282306, u'name': u'.text', u'virtual_size': u'0x00036cd1'} entropy 7.04631003028 description A section with a high entropy has been found
entropy 0.701277955272 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

__anomaly__

tid: 2548
message: Encountered 65537 exceptions, quitting.
subcategory: exception
function_name:
1 0 0
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
FireEye Generic.mg.ead27a4a9505a300
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZexaF.34790.tuW@aK@@x7dG
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HLQL
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Graftor.975154
Avast Win32:PWSX-gen [Trj]
Ad-Aware Gen:Variant.Graftor.975154
McAfee-GW-Edition BehavesLike.Win32.Trojan.fh
Sophos Mal/Generic-R + Troj/Kryptik-TR
MAX malware (ai score=84)
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Gridinsoft Trojan.Win32.Packed.vl!heur
Microsoft Trojan:Win32/Caynamer.A!ml
GData Gen:Variant.Graftor.975154
Cynet Malicious (score: 100)
McAfee RDN/Generic.hbg
VBA32 BScope.Trojan.Wacatac
Malwarebytes Trojan.MalPack
Tencent Win32.Backdoor.Fareit.Auto
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_99%
Fortinet W32/GenKryptik.FHII!tr
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.736a99
Qihoo-360 HEUR/QVM10.1.7293.Malware.Gen