__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x77b3ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x77b3af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633052
registers.edi:
1633140
registers.eax:
23117
registers.ebp:
1633112
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633176
registers.edi:
1633272
registers.eax:
23117
registers.ebp:
1633236
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008264192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x77b1317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x77b2199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x77b2193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1633068
registers.edi:
1633156
registers.eax:
23117
registers.ebp:
1633128
registers.edx:
0
registers.ebx:
0
registers.esi:
32178176
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x77b0f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x77b0f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x77b2176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x77b3af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x77b218ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x77b2174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77b23e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75673b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7557db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74b07322
0x1eb603b
0x1eb4117
0x1eb4204
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e13e @ 0x45e13e
rfq-order_sheet#43254363-sept-21_signed-copy+0x5e805 @ 0x45e805
rfq-order_sheet#43254363-sept-21_signed-copy+0x4053 @ 0x404053
rfq-order_sheet#43254363-sept-21_signed-copy+0x40bb @ 0x4040bb
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x76a433ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77b19ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77b19ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x77b0f4ef
registers.esp:
1632920
registers.edi:
1633016
registers.eax:
23117
registers.ebp:
1632980
registers.edx:
0
registers.ebx:
32178176
registers.esi:
32178176
registers.ecx:
2008160768
|
1
|
0 |
0
|