| Time & API |
Arguments |
Status |
Return |
Repeated |
1619925691.400001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
135168
registers.eax:
0
registers.ebp:
1638148
registers.edx:
1983904256
registers.ebx:
1983189538
registers.esi:
1983912052
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.400001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
200704
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
266240
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
331776
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
397312
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
462848
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
528384
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
593920
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
659456
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
724992
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
790528
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
856064
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
921600
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
987136
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1052672
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1118208
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1183744
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1249280
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1314816
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1380352
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1445888
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1511424
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1576960
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1708032
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.416001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1773568
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1839104
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
1904640
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
2428928
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
5570625
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
2494464
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
2560000
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
2625536
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
2691072
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3084288
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1987242984
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3149824
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3280896
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
46776
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3477504
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3543040
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3608576
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3674112
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3739648
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
3805184
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.431001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
4067328
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7409664
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
2504597036
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7475200
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7671808
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
0
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7737344
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7802880
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7868416
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7933952
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|
1619925691.447001
__exception__
|
stacktrace:
d149b481ff1994a5d7a3229e1b15ee9b+0x2aa354 @ 0x6aa354
0x33f9530
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0c4 @ 0x5ca0c4
d149b481ff1994a5d7a3229e1b15ee9b+0x1ca0b8 @ 0x5ca0b8
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
1638136
registers.edi:
7999488
registers.eax:
0
registers.ebp:
1638148
registers.edx:
2010606285
registers.ebx:
0
registers.esi:
1637012
registers.ecx:
1638268
exception.instruction_r:
8b 3f 5f b8 01 00 00 00 3e 8b 4d 14 e9 15 06 00
exception.symbol:
d149b481ff1994a5d7a3229e1b15ee9b+0x2a9f6a
exception.instruction:
mov edi, dword ptr [edi]
exception.module:
d149b481ff1994a5d7a3229e1b15ee9b.exe
exception.exception_code:
0xc0000005
exception.offset:
2793322
exception.address:
0x6a9f6a
|
success
|
0 |
0
|