| Time & API |
Arguments |
Status |
Return |
Repeated |
1619426982.799924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
135168
registers.eax:
0
registers.ebp:
1638196
registers.edx:
1983904256
registers.ebx:
1983189538
registers.esi:
1983912052
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.799924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
200704
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.799924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
266240
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.799924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
331776
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
397312
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
462848
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
528384
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
593920
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
659456
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
724992
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
790528
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
856064
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
921600
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
987136
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1052672
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1118208
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1183744
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1249280
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1314816
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1380352
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1445888
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1511424
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1576960
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1708032
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.815924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1773568
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1839104
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
1904640
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2428928
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
5570625
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2494464
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2691072
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2756608
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2822144
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2887680
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
2953216
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3018752
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3084288
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3149824
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3215360
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3608576
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
779251572
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3674112
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
3805184
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
46776
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
4067328
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7016448
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7147520
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
2504597036
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7213056
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7278592
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.830924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7344128
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.846924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7409664
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.846924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7475200
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|
1619426982.846924
__exception__
|
stacktrace:
5774817a431cf389bbbf1d9a2b48e9ad+0xbb4ed @ 0x4bb4ed
5774817a431cf389bbbf1d9a2b48e9ad+0x56f85 @ 0x456f85
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638184
registers.edi:
7540736
registers.eax:
0
registers.ebp:
1638196
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637060
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 d2 fb ff
exception.symbol:
5774817a431cf389bbbf1d9a2b48e9ad+0xbaca0
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
5774817a431cf389bbbf1d9a2b48e9ad.exe
exception.exception_code:
0xc0000005
exception.offset:
765088
exception.address:
0x4baca0
|
success
|
0 |
0
|