| Time & API |
Arguments |
Status |
Return |
Repeated |
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.718386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.733386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.765386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.780386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.812386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.827386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.827386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.827386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.827386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.843386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.843386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.843386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.858386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.874386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.905386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.921386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.937386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.937386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.937386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.937386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.937386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.952386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.952386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.952386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.952386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.952386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.968386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.968386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.968386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.968386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.983386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|
1619141367.983386
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x765ae4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x765ae56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x765a0d74
overlap+0x121e @ 0x40121e
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1637940
registers.edi:
1638224
registers.eax:
1637964
registers.ebp:
1637980
registers.edx:
0
registers.ebx:
0
registers.esi:
1399158377
registers.ecx:
1399158377
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77d95e29
|
success
|
0 |
0
|