| Time & API |
Arguments |
Status |
Return |
Repeated |
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8126464
registers.eax:
0
registers.ebp:
1638192
registers.edx:
1983904256
registers.ebx:
1983189538
registers.esi:
1983912052
registers.ecx:
1129530706
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8192000
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8257536
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8323072
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8585216
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
878523484
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8650752
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8716288
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8781824
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8847360
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9240576
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9306112
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9371648
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9437184
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9502720
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9568256
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9633792
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9699328
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9764864
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9830400
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
9895936
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10027008
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10092544
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10158080
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10223616
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10289152
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10354688
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10420224
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10485760
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10551296
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10616832
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10682368
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10747904
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10813440
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10878976
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10944512
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11010048
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11075584
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11141120
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11206656
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11272192
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11337728
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11403264
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
11468800
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13369344
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
256
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13434880
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13500416
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13565952
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13631488
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13697024
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|
1619340440.1095
__exception__
|
stacktrace:
2b33e8c77430630bad364c1be8b052b2+0x1c1d07 @ 0x5c1d07
2b33e8c77430630bad364c1be8b052b2+0x1137c8 @ 0x5137c8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
13762560
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 64 89 0d 00
exception.symbol:
2b33e8c77430630bad364c1be8b052b2+0x1c6858
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
2b33e8c77430630bad364c1be8b052b2.exe
exception.exception_code:
0xc0000005
exception.offset:
1861720
exception.address:
0x5c6858
|
success
|
0 |
0
|