| Time & API |
Arguments |
Status |
Return |
Repeated |
1619999699.603822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x15b4 @ 0x4015b4
edf6426b7730042d5f1068a325dc409b+0x13c2 @ 0x4013c2
edf6426b7730042d5f1068a325dc409b+0xdcf8 @ 0x40dcf8
registers.esp:
1637916
registers.edi:
0
registers.eax:
0
registers.ebp:
1637932
registers.edx:
2130566132
registers.ebx:
0
registers.esi:
4194304
registers.ecx:
3230007296
exception.instruction_r:
a1 b9 40 40 00 8b 0d b5 40 40 00 03 c8 89 0d 08
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1bc3
exception.instruction:
mov eax, dword ptr [0x4040b9]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
7107
exception.address:
0x401bc3
|
success
|
0 |
0
|
1619999699.603822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x15b4 @ 0x4015b4
edf6426b7730042d5f1068a325dc409b+0x13c2 @ 0x4013c2
edf6426b7730042d5f1068a325dc409b+0xdcf8 @ 0x40dcf8
registers.esp:
1637916
registers.edi:
0
registers.eax:
1867734135
registers.ebp:
1637932
registers.edx:
2130566132
registers.ebx:
0
registers.esi:
4194304
registers.ecx:
3230007296
exception.instruction_r:
8b 0d b5 40 40 00 03 c8 89 0d 08 31 40 00 eb 16
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1bc8
exception.instruction:
mov ecx, dword ptr [0x4040b5]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
7112
exception.address:
0x401bc8
|
success
|
0 |
0
|
1619999699.603822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x15b4 @ 0x4015b4
edf6426b7730042d5f1068a325dc409b+0x13c2 @ 0x4013c2
edf6426b7730042d5f1068a325dc409b+0xdcf8 @ 0x40dcf8
registers.esp:
1637916
registers.edi:
0
registers.eax:
1867734135
registers.ebp:
1637932
registers.edx:
2130566132
registers.ebx:
0
registers.esi:
4194304
registers.ecx:
3230007296
exception.instruction_r:
8b 0d b5 40 40 00 03 c8 89 0d 08 31 40 00 eb 16
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1bc8
exception.instruction:
mov ecx, dword ptr [0x4040b5]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
7112
exception.address:
0x401bc8
|
success
|
0 |
0
|
1619999699.603822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x15b4 @ 0x4015b4
edf6426b7730042d5f1068a325dc409b+0x13c2 @ 0x4013c2
edf6426b7730042d5f1068a325dc409b+0xdcf8 @ 0x40dcf8
registers.esp:
1637916
registers.edi:
0
registers.eax:
1867734135
registers.ebp:
1637932
registers.edx:
2130566132
registers.ebx:
0
registers.esi:
4194304
registers.ecx:
1867276660
exception.instruction_r:
03 c8 89 0d 08 31 40 00 eb 16 a1 0c 31 40 00 85
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1bce
exception.instruction:
add ecx, eax
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
7118
exception.address:
0x401bce
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193832
registers.edi:
31653888
registers.eax:
36672912
registers.ebp:
31193948
registers.edx:
2130553844
registers.ebx:
3735010795
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
8b 46 3c 8b 44 30 50 6a 04 05 ff 0f 00 00 68 00
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1005
exception.instruction:
mov eax, dword ptr [esi + 0x3c]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4101
exception.address:
0x401005
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193832
registers.edi:
31653888
registers.eax:
248
registers.ebp:
31193948
registers.edx:
2130553844
registers.ebx:
3735010795
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
8b 44 30 50 6a 04 05 ff 0f 00 00 68 00 10 00 00
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1008
exception.instruction:
mov eax, dword ptr [eax + esi + 0x50]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4104
exception.address:
0x401008
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193832
registers.edi:
31653888
registers.eax:
248
registers.ebp:
31193948
registers.edx:
2130553844
registers.ebx:
3735010795
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
8b 44 30 50 6a 04 05 ff 0f 00 00 68 00 10 00 00
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1008
exception.instruction:
mov eax, dword ptr [eax + esi + 0x50]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4104
exception.address:
0x401008
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193832
registers.edi:
31653888
registers.eax:
61440
registers.ebp:
31193948
registers.edx:
2130553844
registers.ebx:
3735010795
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
6a 04 05 ff 0f 00 00 68 00 10 00 00 25 00 f0 ff
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x100c
exception.instruction:
push 4
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4108
exception.address:
0x40100c
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193812
registers.edi:
31653888
registers.eax:
31653888
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
31653888
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
8b 42 3c 03 c2 0f b7 48 14 53 0f b7 58 06 56 57
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1222
exception.instruction:
mov eax, dword ptr [edx + 0x3c]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4642
exception.address:
0x401222
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193812
registers.edi:
31653888
registers.eax:
248
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
31653888
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
03 c2 0f b7 48 14 53 0f b7 58 06 56 57 8b 78 3c
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1225
exception.instruction:
add eax, edx
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4645
exception.address:
0x401225
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193812
registers.edi:
31653888
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
31653888
registers.esi:
36672912
registers.ecx:
3230007296
exception.instruction_r:
0f b7 48 14 53 0f b7 58 06 56 57 8b 78 3c 8d 74
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1227
exception.instruction:
movzx ecx, word ptr [eax + 0x14]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4647
exception.address:
0x401227
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193812
registers.edi:
31653888
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
31653888
registers.esi:
36672912
registers.ecx:
224
exception.instruction_r:
53 0f b7 58 06 56 57 8b 78 3c 8d 74 01 18 0f b7
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x122b
exception.instruction:
push ebx
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4651
exception.address:
0x40122b
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193808
registers.edi:
31653888
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
31653888
registers.esi:
36672912
registers.ecx:
224
exception.instruction_r:
0f b7 58 06 56 57 8b 78 3c 8d 74 01 18 0f b7 48
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x122c
exception.instruction:
movzx ebx, word ptr [eax + 6]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4652
exception.address:
0x40122c
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193808
registers.edi:
31653888
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36672912
registers.ecx:
224
exception.instruction_r:
56 57 8b 78 3c 8d 74 01 18 0f b7 48 04 8b 40 54
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1230
exception.instruction:
push esi
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4656
exception.address:
0x401230
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
31653888
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36672912
registers.ecx:
224
exception.instruction_r:
8b 78 3c 8d 74 01 18 0f b7 48 04 8b 40 54 50 52
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1232
exception.instruction:
mov edi, dword ptr [eax + 0x3c]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4658
exception.address:
0x401232
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
512
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36672912
registers.ecx:
224
exception.instruction_r:
8d 74 01 18 0f b7 48 04 8b 40 54 50 52 ff 75 08
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1235
exception.instruction:
lea esi, dword ptr [ecx + eax + 0x18]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4661
exception.address:
0x401235
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
512
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36673408
registers.ecx:
224
exception.instruction_r:
0f b7 48 04 8b 40 54 50 52 ff 75 08 89 5d fc e8
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1239
exception.instruction:
movzx ecx, word ptr [eax + 4]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4665
exception.address:
0x401239
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
512
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36673408
registers.ecx:
332
exception.instruction_r:
8b 40 54 50 52 ff 75 08 89 5d fc e8 f9 fe ff ff
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x123d
exception.instruction:
mov eax, dword ptr [eax + 0x54]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4669
exception.address:
0x40123d
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
512
registers.eax:
36673160
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36673408
registers.ecx:
332
exception.instruction_r:
8b 40 54 50 52 ff 75 08 89 5d fc e8 f9 fe ff ff
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x123d
exception.instruction:
mov eax, dword ptr [eax + 0x54]
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0xc0000005
exception.offset:
4669
exception.address:
0x40123d
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193800
registers.edi:
512
registers.eax:
1024
registers.ebp:
31193816
registers.edx:
36672912
registers.ebx:
5
registers.esi:
36673408
registers.ecx:
332
exception.instruction_r:
50 52 ff 75 08 89 5d fc e8 f9 fe ff ff 83 c4 0c
exception.symbol:
edf6426b7730042d5f1068a325dc409b+0x1240
exception.instruction:
push eax
exception.module:
edf6426b7730042d5f1068a325dc409b.exe
exception.exception_code:
0x80000004
exception.offset:
4672
exception.address:
0x401240
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653888
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672912
registers.ecx:
256
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653892
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672916
registers.ecx:
255
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653892
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672916
registers.ecx:
255
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653896
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672920
registers.ecx:
254
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653896
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672920
registers.ecx:
254
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.619822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653900
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672924
registers.ecx:
253
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653900
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672924
registers.ecx:
253
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653904
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672928
registers.ecx:
252
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653904
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672928
registers.ecx:
252
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653908
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672932
registers.ecx:
251
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653908
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672932
registers.ecx:
251
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653912
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672936
registers.ecx:
250
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653912
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672936
registers.ecx:
250
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653916
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672940
registers.ecx:
249
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653916
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672940
registers.ecx:
249
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653920
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672944
registers.ecx:
248
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653920
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672944
registers.ecx:
248
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653924
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672948
registers.ecx:
247
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653924
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672948
registers.ecx:
247
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653928
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672952
registers.ecx:
246
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653928
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672952
registers.ecx:
246
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653932
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672956
registers.ecx:
245
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653932
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672956
registers.ecx:
245
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653936
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672960
registers.ecx:
244
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653936
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672960
registers.ecx:
244
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653940
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672964
registers.ecx:
243
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653940
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672964
registers.ecx:
243
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653944
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672968
registers.ecx:
242
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653944
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672968
registers.ecx:
242
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|
1619999699.635822
__exception__
|
stacktrace:
edf6426b7730042d5f1068a325dc409b+0x124d @ 0x40124d
edf6426b7730042d5f1068a325dc409b+0x1033 @ 0x401033
EtwpGetCpuSpeed+0x36f RtlAddVectoredExceptionHandler-0x2b ntdll+0x77400 @ 0x77da7400
KiUserApcDispatcher+0x25 KiUserCallbackDispatcher-0x8f ntdll+0x1005d @ 0x77d4005d
SleepEx+0x65 TlsGetValue-0x45 kernelbase+0x12c50 @ 0x778f2c50
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763533ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77d69ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77d69ea5
registers.esp:
31193772
registers.edi:
31653948
registers.eax:
36673936
registers.ebp:
31193780
registers.edx:
0
registers.ebx:
5
registers.esi:
36672972
registers.ecx:
241
exception.instruction_r:
f3 a5 ff 24 95 8c 24 d5 77 8b c7 ba 03 00 00 00
exception.symbol:
memcpy+0x33 memset-0xbbad ntdll+0x22373
exception.instruction:
movsd dword ptr es:[edi], dword ptr [esi]
exception.module:
ntdll.dll
exception.exception_code:
0x80000004
exception.offset:
140147
exception.address:
0x77d52373
|
success
|
0 |
0
|