| Time & API |
Arguments |
Status |
Return |
Repeated |
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
135168
registers.eax:
0
registers.ebp:
1638120
registers.edx:
1983904256
registers.ebx:
1983189538
registers.esi:
1983912052
registers.ecx:
0
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
200704
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
266240
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
331776
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
397312
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
462848
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
528384
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
593920
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
659456
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
724992
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
790528
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
856064
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
921600
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
987136
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1052672
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1118208
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1183744
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1249280
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1314816
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1380352
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1445888
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1511424
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1576960
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1708032
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
0
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1773568
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1839104
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.006626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
1904640
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2428928
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
5570625
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2494464
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2560000
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2625536
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2691072
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2822144
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
779251572
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
2887680
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3084288
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
2337669003
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3149824
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3280896
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
46776
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3411968
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
0
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3477504
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3543040
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3608576
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3674112
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3739648
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3805184
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3870720
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
3936256
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
4001792
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
4067328
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
4132864
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
1638212
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|
1619811291.115626
__exception__
|
stacktrace:
9d60d8928bc0478b3029e59024b5f407+0x135684 @ 0x535684
9d60d8928bc0478b3029e59024b5f407+0xa97c4 @ 0x4a97c4
9d60d8928bc0478b3029e59024b5f407+0xa97b8 @ 0x4a97b8
9d60d8928bc0478b3029e59024b5f407+0x478f @ 0x40478f
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638108
registers.edi:
6492160
registers.eax:
0
registers.ebp:
1638120
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1636984
registers.ecx:
0
exception.instruction_r:
8b 3f e9 92 f7 ff ff 81 ee f9 9a 2c fa 81 f2 51
exception.symbol:
9d60d8928bc0478b3029e59024b5f407+0x134de6
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
9d60d8928bc0478b3029e59024b5f407.exe
exception.exception_code:
0xc0000005
exception.offset:
1265126
exception.address:
0x534de6
|
success
|
0 |
0
|