__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x13b2e @ 0x413b2e
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x13b46 @ 0x413b46
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xbbd2 @ 0x40bbd2
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xbbea @ 0x40bbea
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xf984 @ 0x40f984
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x358c @ 0x40358c
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x3a9a @ 0x403a9a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x129ac @ 0x4129ac
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1a976 @ 0x41a976
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x16843 @ 0x416843
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1685b @ 0x41685b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x16873 @ 0x416873
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1688b @ 0x41688b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x19240 @ 0x419240
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x19258 @ 0x419258
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x127a6 @ 0x4127a6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1cba6 @ 0x41cba6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1cbbe @ 0x41cbbe
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1cbd6 @ 0x41cbd6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1cbee @ 0x41cbee
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x5648 @ 0x405648
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x5660 @ 0x405660
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x11322 @ 0x411322
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x1133a @ 0x41133a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xf859 @ 0x40f859
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x9342 @ 0x409342
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x935a @ 0x40935a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x9372 @ 0x409372
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x938a @ 0x40938a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x93a2 @ 0x4093a2
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x363b @ 0x40363b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x3653 @ 0x403653
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x366b @ 0x40366b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x793a @ 0x40793a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x7952 @ 0x407952
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xe26c @ 0x40e26c
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xe284 @ 0x40e284
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xe29c @ 0x40e29c
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xb50f @ 0x40b50f
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x153bf @ 0x4153bf
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x153d7 @ 0x4153d7
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x153ef @ 0x4153ef
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x4277 @ 0x404277
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x428f @ 0x40428f
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x42a7 @ 0x4042a7
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x42bf @ 0x4042bf
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x42d7 @ 0x4042d7
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x61cf @ 0x4061cf
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0x45e3 @ 0x4045e3
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RegOpenKeyExA+0x116 DisableThreadLibraryCalls-0xa0 kernel32+0x14845 @ 0x766e4845
RegOpenKeyExA+0x21 DisableThreadLibraryCalls-0x195 kernel32+0x14750 @ 0x766e4750
RegOpenKeyA+0x2e MakeSelfRelativeSD-0x16 advapi32+0xcc43 @ 0x7627cc43
clayer+0xa260 @ 0x40a260
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5
exception.instruction_r:
21 3b c7 45 fc fe ff ff ff 85 ff 0f 85 e8 e3 03
exception.symbol:
RegCloseKey+0x18d RegOpenKeyExW-0xe5 kernel32+0x1222c
exception.instruction:
and dword ptr [ebx], edi
exception.module:
kernel32.dll
exception.exception_code:
0xc0000005
exception.offset:
74284
exception.address:
0x766e222c
registers.esp:
1637980
registers.edi:
0
registers.eax:
8
registers.ebp:
1638100
registers.edx:
0
registers.ebx:
1986854912
registers.esi:
1638148
registers.ecx:
1638148
|
1
|
0 |
0
|