__exception__
|
stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x77950895
stacktrace+0x84 memdup-0x1af @ 0x74e70470
hook_in_monitor+0x45 lde-0x133 @ 0x74e642ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x74e83603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefde43243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefde431fb
faster4upusa+0xc1ab7 @ 0x1400c1ab7
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x77202ef0
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
0x13afff
exception.instruction_r:
0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address:
0x77950895
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
329877
registers.r14:
0
registers.r15:
0
registers.rcx:
4388408
registers.rsi:
5370003456
registers.r10:
0
registers.rbx:
1998597872
registers.rsp:
4390664
registers.r11:
514
registers.r8:
64
registers.r9:
4
registers.rdx:
4389752
registers.r12:
0
registers.rbp:
0
registers.rdi:
5368709487
registers.rax:
4388088
registers.r13:
0
|
1
|
0 |
0
|