__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15bd
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5565
exception.address:
0x4015bd
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15be
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5566
exception.address:
0x4015be
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15bf
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5567
exception.address:
0x4015bf
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c0
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5568
exception.address:
0x4015c0
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c1
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5569
exception.address:
0x4015c1
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c2
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5570
exception.address:
0x4015c2
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c3
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5571
exception.address:
0x4015c3
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c4
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5572
exception.address:
0x4015c4
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c5
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5573
exception.address:
0x4015c5
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c6
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5574
exception.address:
0x4015c6
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c7
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5575
exception.address:
0x4015c7
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c8
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5576
exception.address:
0x4015c8
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15c9
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5577
exception.address:
0x4015c9
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15ca
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5578
exception.address:
0x4015ca
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15cb
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5579
exception.address:
0x4015cb
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15cc
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5580
exception.address:
0x4015cc
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15cd
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5581
exception.address:
0x4015cd
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15ce
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5582
exception.address:
0x4015ce
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15cf
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5583
exception.address:
0x4015cf
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d0
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5584
exception.address:
0x4015d0
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d1
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5585
exception.address:
0x4015d1
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d2
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5586
exception.address:
0x4015d2
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d3
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5587
exception.address:
0x4015d3
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d4
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5588
exception.address:
0x4015d4
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d5
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5589
exception.address:
0x4015d5
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d6
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5590
exception.address:
0x4015d6
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d7
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5591
exception.address:
0x4015d7
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d8
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5592
exception.address:
0x4015d8
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15d9
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5593
exception.address:
0x4015d9
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15da
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5594
exception.address:
0x4015da
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15db
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5595
exception.address:
0x4015db
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15dc
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5596
exception.address:
0x4015dc
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15dd
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5597
exception.address:
0x4015dd
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15de
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5598
exception.address:
0x4015de
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15df
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5599
exception.address:
0x4015df
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e0
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5600
exception.address:
0x4015e0
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e1
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5601
exception.address:
0x4015e1
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e2
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5602
exception.address:
0x4015e2
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e3
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5603
exception.address:
0x4015e3
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e4
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5604
exception.address:
0x4015e4
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e5
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5605
exception.address:
0x4015e5
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15e6
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5606
exception.address:
0x4015e6
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec
exception.symbol:
protecteded+0x15e7
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5607
exception.address:
0x4015e7
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 00
exception.symbol:
protecteded+0x15e8
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5608
exception.address:
0x4015e8
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 00 ec 00 00
exception.symbol:
protecteded+0x15e9
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5609
exception.address:
0x4015e9
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 00 ec 00 00 00
exception.symbol:
protecteded+0x15ea
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5610
exception.address:
0x4015ea
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 00 ec 00 00 00 00
exception.symbol:
protecteded+0x15eb
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5611
exception.address:
0x4015eb
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 00 ec 00 00 00 00 00
exception.symbol:
protecteded+0x15ec
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5612
exception.address:
0x4015ec
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 00 ec 00 00 00 00 00 00
exception.symbol:
protecteded+0x15ed
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5613
exception.address:
0x4015ed
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
protecteded+0x186463 @ 0x586463
EbLoadRunTime+0x1166 DllFunctionCall-0xb5 msvbvm60+0xa048 @ 0x7294a048
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
protecteded+0x20fe @ 0x4020fe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
00 00 00 00 00 00 00 00 ec 00 00 00 00 00 00 00
exception.symbol:
protecteded+0x15ee
exception.instruction:
add byte ptr [eax], al
exception.module:
Protecteded.exe
exception.exception_code:
0xc0000005
exception.offset:
5614
exception.address:
0x4015ee
registers.esp:
1637252
registers.edi:
0
registers.eax:
0
registers.ebp:
1637312
registers.edx:
1637284
registers.ebx:
1923194888
registers.esi:
1923210905
registers.ecx:
0
|
1
|
0 |
0
|