| Time & API |
Arguments |
Status |
Return |
Repeated |
1727545340.703125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130563072
registers.edx:
0
registers.ebx:
4341760
registers.esp:
21298648
registers.ebp:
21298736
registers.esi:
10
registers.edi:
10
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x9fc4 @ 0x409fc4
|
success
|
0 |
0
|
1727545340.703125
__exception__
|
exception.address:
0x775e1bb6
exception.instruction:
cmp dword ptr [esi], 0
exception.instruction_r:
83 3e 00 0f 85 80 bf 01 00 c7 45 fc fe ff ff ff
exception.symbol:
EtwGetTraceEnableFlags+0x48d RtlEqualString-0x216 ntdll+0x61bb6
exception.exception_code:
0xc0000005
registers.eax:
17
registers.ecx:
17
registers.edx:
2003312768
registers.ebx:
22424416
registers.esp:
75103216
registers.ebp:
75103260
registers.esi:
4493312
registers.edi:
22423536
stacktrace:
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x775e1d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x775b9e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x775b9e59
|
success
|
0 |
0
|
1727545344.266125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545347.813125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545351.375125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545354.891125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545358.125125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545361.625125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545365.125125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545369.375125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545370.328125
__exception__
|
exception.address:
0x775e1bb6
exception.instruction:
cmp dword ptr [esi], 0
exception.instruction_r:
83 3e 00 0f 85 80 bf 01 00 c7 45 fc fe ff ff ff
exception.symbol:
EtwGetTraceEnableFlags+0x48d RtlEqualString-0x216 ntdll+0x61bb6
exception.exception_code:
0xc0000005
registers.eax:
17
registers.ecx:
17
registers.edx:
2003312768
registers.ebx:
22424416
registers.esp:
92929008
registers.ebp:
92929052
registers.esi:
4493312
registers.edi:
22423536
stacktrace:
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x775e1d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x775b9e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x775b9e59
|
success
|
0 |
0
|
1727545370.328125
__exception__
|
exception.address:
0x775e1bb6
exception.instruction:
cmp dword ptr [esi], 0
exception.instruction_r:
83 3e 00 0f 85 80 bf 01 00 c7 45 fc fe ff ff ff
exception.symbol:
EtwGetTraceEnableFlags+0x48d RtlEqualString-0x216 ntdll+0x61bb6
exception.exception_code:
0xc0000005
registers.eax:
17
registers.ecx:
17
registers.edx:
2003312768
registers.ebx:
22424416
registers.esp:
109706224
registers.ebp:
109706268
registers.esi:
4493312
registers.edi:
22423536
stacktrace:
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x775e1d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x775b9e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x775b9e59
|
success
|
0 |
0
|
1727545370.328125
__exception__
|
exception.address:
0x775e1bb6
exception.instruction:
cmp dword ptr [esi], 0
exception.instruction_r:
83 3e 00 0f 85 80 bf 01 00 c7 45 fc fe ff ff ff
exception.symbol:
EtwGetTraceEnableFlags+0x48d RtlEqualString-0x216 ntdll+0x61bb6
exception.exception_code:
0xc0000005
registers.eax:
17
registers.ecx:
17
registers.edx:
2003312768
registers.ebx:
22424416
registers.esp:
126483440
registers.ebp:
126483484
registers.esi:
4493312
registers.edi:
22423536
stacktrace:
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x775e1d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x775b9e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x775b9e59
|
success
|
0 |
0
|
1727545373.875125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545378.109125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545382.609125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545386.109125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545389.672125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545393.234125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545396.766125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545400.359125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545403.875125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545407.406125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545410.922125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545414.484125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545417.750125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545421.297125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545425.547125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545428.781125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545437.328125
__exception__
|
exception.address:
0x775e1bb6
exception.instruction:
cmp dword ptr [esi], 0
exception.instruction_r:
83 3e 00 0f 85 80 bf 01 00 c7 45 fc fe ff ff ff
exception.symbol:
EtwGetTraceEnableFlags+0x48d RtlEqualString-0x216 ntdll+0x61bb6
exception.exception_code:
0xc0000005
registers.eax:
17
registers.ecx:
17
registers.edx:
2003312768
registers.ebx:
22424416
registers.esp:
109706580
registers.ebp:
109706624
registers.esi:
4493312
registers.edi:
22423536
stacktrace:
RtlCharToInteger+0x52e DbgPrint-0x9a ntdll+0x7a706 @ 0x775fa706
RtlExitUserThread+0x2a RtlCleanUpTEBLangLists-0x38 ntdll+0x5d5c2 @ 0x775dd5c2
EtwGetTraceEnableFlags+0x3e0 RtlEqualString-0x2c3 ntdll+0x61b09 @ 0x775e1b09
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545443.969125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545447.219125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545450.469125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545453.734125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|
1727545457.094125
__exception__
|
exception.address:
0x40eb88
exception.instruction:
test ch, byte ptr [ecx + 0x8558ffff]
exception.instruction_r:
84 a9 ff ff 58 85 c0 74 43 b8 01 00 00 00 8d 55
exception.symbol:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xeb88
exception.exception_code:
0x80000003
registers.eax:
0
registers.ecx:
2130538496
registers.edx:
75104088
registers.ebx:
23294320
registers.esp:
75103904
registers.ebp:
75103992
registers.esi:
0
registers.edi:
0
stacktrace:
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xf227 @ 0x40f227
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0x18815 @ 0x418815
0d5173a6143d68520259da27191f0c3d4be65cc48d58e0dc2a433594d68e70d1+0xbefe @ 0x40befe
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76ee33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x775b9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x775b9ea5
|
success
|
0 |
0
|