Disconnects for me too. Running 32-bit WinVista Home Premium. Tested with the packed dekaron.exe and the unpacked one.
--> Logfile:
[21:49:13] ===========DLL successfully injected, log start===========
[21:49:13] Reading initial parameters...
[21:49:13] Disable Xigncode : YES
[21:49:13] Bypass CRC : NO
[21:49:13] Xigncode emulator : D:\GlobalDekaron Reinstalled\bin\ReXIGNation V1.53\client.dll
[21:49:13] Image base : 00400000
[21:49:13] Target code section: from 00401000 to 00C67000
[21:49:13] Image size = 8984268
[21:49:13] Exception handling successfully initialized
[21:49:13] Hook module : 77610000
[21:49:13] Start address : 77639D0B
[21:49:13] Catched exception: Code C0000005 at address 00C763F0
[21:49:13] Catched exception: Code C0000005 at address 00C7670E
[21:49:13] Return address = 0087A82A
[21:49:13] Client code is unpacked
[21:49:13] Thread 08D4 suspended
[21:49:13] Thread 0BD4 suspended
[21:49:13] Thread 0F7C suspended
[21:49:13] Thread 01F0 suspended
[21:49:13] Thread 0494 suspended
[21:49:13] Thread 0DE4 suspended
[21:49:13] Thread 0E60 suspended
[21:49:13] Thread 0B70 suspended
[21:49:13] Thread 0670 suspended
[21:49:13] Attaching Xigncode emulator...
[21:49:13] Patched 0040B4E0
[21:49:13] Patched 0040B500
[21:49:13] Patched 0040B580
[21:49:13] Patched 0040B5E0
[21:49:13] Patched 0040B6D0
[21:49:13] Patched 0040B720
[21:49:13] Patched 0040B780
[21:49:13] Patched 0040B7F0
[21:49:13] Successful
[21:49:13] Catched exception: Code C0000005 at address 77658C37
[21:49:13] Native image at 02F10000 size 00065000
[21:49:13] Initializing SB...
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA20A0
[21:49:13] SB : kernel32.dll, 776B9D1C, 776B9D40
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA2170
[21:49:13] SB : kernel32.dll, 776AF31B, 776AF38D
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA2240
[21:49:13] SB : kernel32.dll, 776A941D, 776A9435
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA2500
[21:49:13] SB : kernel32.dll, 77697F6A, 77697FDD
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA2650
[21:49:13] SB : kernel32.dll, 77698EAA, 77698F01
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA26F0
[21:49:13] SB : kernel32.dll, 776B9A04, 776B9A7C
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA27A0
[21:49:13] SB : kernel32.dll, 776B77EE, 776B786C
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA2840
[21:49:13] SB : kernel32.dll, 776BA784, 776BA808
[21:49:13] Module kernel32.dll (from 77611000 to 776DE000), proc = 00DA28F0
[21:49:13] SB : kernel32.dll, 77612FA0, 7761300C
[21:49:13] Module user32.dll (from 764D1000 to 76539000), proc = 00DA22A0
[21:49:13] SB : user32.dll, 764F2360, 764F237D
[21:49:13] Module user32.dll (from 764D1000 to 76539000), proc = 00DA2300
[21:49:13] SB : user32.dll, 764D7944, 764D795E
[21:49:13] Module user32.dll (from 764D1000 to 76539000), proc = 00DA2360
[21:49:13] SB : user32.dll, 76519C13, 76519C8A
[21:49:13] Module user32.dll (from 764D1000 to 76539000), proc = 00DA23F0
[21:49:13] SB : user32.dll, 7651C069, 7651C0AA
[21:49:13] Module user32.dll (from 764D1000 to 76539000), proc = 00DA2440
[21:49:13] SB : user32.dll, 76532694, 765326EF
[21:49:15] Catched exception: Code 406D1388 at address 7764FBAE
[21:49:48] Catched exception: Code 40010006 at address 7764FBAE
[21:49:48] Catched exception: Code 40010006 at address 7764FBAE
[21:49:56] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] SB: 77610000 DecodePointer
[21:50:02] SB: 77610000 DecodePointer
[21:50:02] SB: 77610000 EncodePointer
[21:50:02] SB: 77610000 DecodePointer
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:02] SB: 77610000 CreateEventA
[21:50:02] SB: 77610000 WaitForSingleObject
[21:50:02] SB: 77610000 LeaveCriticalSection
[21:50:02] SB: 77610000 SetEvent
[21:50:02] SB: 77610000 DeleteCriticalSection
[21:50:02] SB: 77610000 CloseHandle
[21:50:02] SB: 77610000 GetLastError
[21:50:02] SB: 77610000 GetCurrentProcessId
[21:50:02] SB: 77610000 lstrlenA
[21:50:02] SB: 77610000 CreateThread
[21:50:02] SB: 77610000 EnterCriticalSection
[21:50:02] SB: 77610000 InitializeCriticalSection
[21:50:02] SB: 77610000 DisableThreadLibraryCalls
[21:50:02] SB: 77610000 TerminateThread
[21:50:02] SB: 77610000 InterlockedIncrement
[21:50:02] SB: 77610000 CreateEventW
[21:50:02] SB: 764D0000 wsprintfA
[21:50:02] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] SB: 77610000 GetModuleHandleA
[21:50:06] SB: 77610000 VirtualFree
[21:50:06] SB: 77610000 CloseHandle
[21:50:06] SB: 77610000 GetProcessHeap
[21:50:06] SB: 77610000 GetVersion
[21:50:06] SB: 77610000 GetCurrentProcessId
[21:50:06] SB: 77610000 SetFileAttributesW
[21:50:06] SB: 77610000 GetFileAttributesW
[21:50:06] SB: 77610000 ReadFile
[21:50:06] SB: 77610000 GetModuleFileNameW
[21:50:06] SB: 77610000 CreateFileW
[21:50:06] SB: 77610000 GetFileSize
[21:50:06] SB: 77610000 lstrcmpW
[21:50:06] SB: 77610000 SetFilePointer
[21:50:06] SB: 77610000 lstrlenW
[21:50:06] SB: 77610000 lstrlenA
[21:50:06] SB: 77610000 HeapAlloc
[21:50:06] SB: 77610000 VirtualAlloc
[21:50:06] SB: 77610000 HeapFree
[21:50:06] SB: 764D0000 wsprintfW
[21:50:06] SB: 764D0000 CharLowerW
[21:50:06] SB: 764D0000 GetDesktopWindow
[21:50:06] SB: 764D0000 SendMessageA
[21:50:06] SB: 764D0000 FindWindowExA
[21:50:06] SB: 764D0000 FindWindowA
[21:50:06] SB: 764D0000 GetWindowThreadProcessId
[21:50:06] SB: 764D0000 wvsprintfA
[21:50:06] SB: 75FE0000 StrRChrW
[21:50:06] Scan(3)->20301BE3 ()
[21:50:06] SB : GMFNW : 00000000
[21:50:06] SB: GMHA: dekaron.exe
[21:50:06] SB: GMHA: mss32.dll
[21:50:06] SB: GMHA: mssdsp.flt
[21:50:06] SB: GMHA: mssmp3.asi
[21:50:06] SB: GMHA: mssvoice.asi
[21:50:06] SB: GMHA: d3d8thk.dll
[21:50:06] SB: GMHA: d3d9.dll
[21:50:06] SB: GMHA: DSOUND.DLL
[21:50:06] SB: GMHA: client.dll
[21:50:06] SB: GMHA: rexign.dll
[21:50:06] SB: GMHA: vashj.xem
[21:50:06] SB: GMHAZ
[21:50:06] SB: GMHAZ
[21:50:06] SB: GMHA: vashj.xem
[21:50:06] SB : GMFNW : 10000000
[21:50:06] SB : GMFW -> D:\GlobalDekaron Reinstalled\bin\xigncode\vashj.xem
[21:50:06] SB: GMHA: vashj.xem
[21:50:06] SB : GMFNW : 10000000
[21:50:06] SB : GMFW -> D:\GlobalDekaron Reinstalled\bin\xigncode\vashj.xemem
[21:50:06] SB : GMFNW : 00000000
[21:50:06] Xigncode monitor : Received data 0000008B, CLEAR_DLL;llllllll__l;2E4A657573000000;000000000;O pkU;dekaron.exe;ffd3ffd3;VJNsign;WRVD;
[21:50:06] Catched exception: Code 40010006 at address 7764FBAE
[21:50:06] Catched exception: Code 406D1388 at address 7764FBAE
[21:50:07] Catched exception: Code 40010006 at address 7764FBAE
[21:50:10] Target process is going to close
[21:50:10] =================DLL unloaded, log closed=================