| Time & API |
Arguments |
Status |
Return |
Repeated |
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5046272
registers.eax:
0
registers.ebp:
1638192
registers.edx:
1983904256
registers.ebx:
1983189538
registers.esi:
1983912052
registers.ecx:
4125117381
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5111808
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5177344
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5242880
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5308416
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5373952
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5439488
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.138017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5505024
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5767168
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
0
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5832704
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5898240
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
5963776
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6029312
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6094848
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6160384
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.154017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6225920
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6291456
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6356992
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6422528
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6488064
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6553600
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.169017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6684672
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
0
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6750208
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6815744
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6881280
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
6946816
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7012352
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7077888
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7143424
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7208960
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7274496
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7340032
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7405568
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7471104
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7536640
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7602176
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7667712
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7733248
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7798784
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7864320
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7929856
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
7995392
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8060928
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8126464
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.185017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8257536
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
0
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.200017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8323072
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.200017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8388608
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.200017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
8454144
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.200017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10354688
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
256
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|
1619649225.200017
__exception__
|
stacktrace:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc612f @ 0x4c612f
7e7bffdf3b021dd9a0ccc23e3ac6008f+0x72730 @ 0x472730
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638180
registers.edi:
10420224
registers.eax:
0
registers.ebp:
1638192
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637056
registers.ecx:
1638340
exception.instruction_r:
8b 3f e9 be f3 ff ff 8b c2 05 00 2e 74 76 e9 55
exception.symbol:
7e7bffdf3b021dd9a0ccc23e3ac6008f+0xc834e
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
7e7bffdf3b021dd9a0ccc23e3ac6008f.exe
exception.exception_code:
0xc0000005
exception.offset:
820046
exception.address:
0x4c834e
|
success
|
0 |
0
|