| Time & API |
Arguments |
Status |
Return |
Repeated |
1619159058.465249
__exception__
|
stacktrace:
WNetGetLastErrorA+0x10d WNetGetNetworkInformationA-0x2e9 mpr+0xa803 @ 0x7554a803
WNetGetUserA+0x37 WNetGetDirectoryTypeA-0x48 mpr+0xb3f6 @ 0x7554b3f6
04cf3363afd99a805f7d4be02df9f87c+0x2aedc @ 0x42aedc
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637560
registers.edi:
97
registers.eax:
0
registers.ebp:
1637580
registers.edx:
1637620
registers.ebx:
1968468876
registers.esi:
1637620
registers.ecx:
4294967295
exception.instruction_r:
f2 ae f7 d1 81 f9 ff ff 00 00 76 05 b9 ff ff 00
exception.symbol:
RtlInitAnsiString+0x1b RtlInitUnicodeString-0x1d ntdll+0x2e1eb
exception.instruction:
scasb al, byte ptr es:[edi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
188907
exception.address:
0x77d5e1eb
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.481249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.497249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.512249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|
1619159058.528249
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x75c883ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x75d201fe
NotifyServiceStatusChangeA+0x133 ConvertSidToStringSidW-0x6b1 sechost+0xa250 @ 0x7757a250
QueryServiceObjectSecurity+0x31 SetServiceObjectSecurity-0x5c sechost+0x5125 @ 0x77575125
04cf3363afd99a805f7d4be02df9f87c+0x2b22d @ 0x42b22d
04cf3363afd99a805f7d4be02df9f87c+0x2aaa9 @ 0x42aaa9
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1636632
registers.edi:
2002196262
registers.eax:
3644
registers.ebp:
1636672
registers.edx:
0
registers.ebx:
1637772
registers.esi:
1
registers.ecx:
3644
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x75c883d2
|
success
|
0 |
0
|