__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
8978432
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
1971173041
registers.ebx:
459282112
registers.esi:
3369227470
registers.ecx:
3703974148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9043968
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9109504
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9175040
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9240576
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9306112
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9371648
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9437184
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9502720
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9568256
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9633792
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9699328
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9764864
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9830400
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9895936
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
9961472
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10027008
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10092544
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10158080
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10223616
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10289152
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10354688
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10420224
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10485760
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10682368
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
459282112
registers.esi:
3369227470
registers.ecx:
141572
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10747904
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10813440
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10878976
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
10944512
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11010048
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11075584
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11141120
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11206656
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11272192
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11337728
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11403264
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11468800
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11534336
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11599872
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11665408
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11730944
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11796480
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11862016
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11927552
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
11993088
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
12058624
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
12124160
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
13828096
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
459282112
registers.esi:
3369227470
registers.ecx:
10500
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
14286848
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
459282112
registers.esi:
3369227470
registers.ecx:
10500
|
1
|
0 |
0
|
__exception__
|
stacktrace:
nett+0x4859fc @ 0x8859fc
nett+0x2663 @ 0x402663
nett+0x27f1e3 @ 0x67f1e3
nett+0x27f0b7 @ 0x67f0b7
nett+0x27ef5d @ 0x67ef5d
nett+0x27f248 @ 0x67f248
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757333ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5
exception.instruction_r:
8b bf 00 10 00 00 f7 d8 eb 06 f2 40 03 a9 15 22
exception.symbol:
nett+0x4858e7
exception.instruction:
mov edi, dword ptr [edi + 0x1000]
exception.module:
nett.exe
exception.exception_code:
0xc0000005
exception.offset:
4741351
exception.address:
0x8858e7
registers.esp:
850788
registers.edi:
14352384
registers.eax:
1768867074
registers.ebp:
850800
registers.edx:
2000598705
registers.ebx:
5824
registers.esi:
808142
registers.ecx:
796932
|
1
|
0 |
0
|