__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x71d68 @ 0x471d68
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x71d71 @ 0x471d71
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x71d88 @ 0x471d88
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x71d91 @ 0x471d91
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x71da8 @ 0x471da8
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x71db1 @ 0x471db1
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x71dc8 @ 0x471dc8
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x71dd1 @ 0x471dd1
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x746c1 @ 0x4746c1
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x746ca @ 0x4746ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x746e1 @ 0x4746e1
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x746ea @ 0x4746ea
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x74701 @ 0x474701
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7470a @ 0x47470a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x74721 @ 0x474721
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7472a @ 0x47472a
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x74741 @ 0x474741
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x769ab @ 0x4769ab
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x747f6 @ 0x4747f6
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x747ff @ 0x4747ff
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x7ca11 @ 0x47ca11
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7164d @ 0x47164d
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x71664 @ 0x471664
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7166d @ 0x47166d
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x72222 @ 0x472222
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7222b @ 0x47222b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x72242 @ 0x472242
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7224b @ 0x47224b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x72262 @ 0x472262
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7226b @ 0x47226b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x72282 @ 0x472282
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7228b @ 0x47228b
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x722a2 @ 0x4722a2
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x722ab @ 0x4722ab
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x722c2 @ 0x4722c2
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x722cb @ 0x4722cb
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x73ea8 @ 0x473ea8
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7018d @ 0x47018d
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x701a4 @ 0x4701a4
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x701ad @ 0x4701ad
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x701c4 @ 0x4701c4
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x701cd @ 0x4701cd
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x701e4 @ 0x4701e4
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x701ed @ 0x4701ed
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x70204 @ 0x470204
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7020d @ 0x47020d
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x70224 @ 0x470224
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x7022d @ 0x47022d
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|
__exception__
|
stacktrace:
GetThreadWaitChain+0x731a advapi32+0x6e4e1 @ 0x74aee4e1
GetThreadWaitChain+0x73a5 advapi32+0x6e56c @ 0x74aee56c
RegSaveKeyA+0xab RegSetValueA-0xcd advapi32+0x60d74 @ 0x74ae0d74
file+0x6d133 @ 0x46d133
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
80 3e 01 0f 85 f6 21 01 00 bf 00 80 00 00 8b c7
exception.symbol:
RtlValidSecurityDescriptor+0x13 RtlTestBit-0x3a2 ntdll+0x65e29
exception.instruction:
cmp byte ptr [esi], 1
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
417321
exception.address:
0x77315e29
registers.esp:
1638072
registers.edi:
6711689
registers.eax:
1638096
registers.ebp:
1638112
registers.edx:
0
registers.ebx:
0
registers.esi:
1680749107
registers.ecx:
1680749107
|
1
|
0 |
0
|
__exception__
|
stacktrace:
NDRCContextMarshall+0x2b7 NDRCContextBinding-0x12 rpcrt4+0x183ad @ 0x74dd83ad
NdrClientCall2+0x1f9 RpcAsyncInitializeHandle-0x10 rpcrt4+0xb01fe @ 0x74e701fe
RegSetValueA+0x1ce GetServiceKeyNameA-0xb85 advapi32+0x6100f @ 0x74ae100f
GetProfileStringW+0xf337 EnumResourceNamesW-0x3687e kernel32+0x4c8e3 @ 0x768ac8e3
New_advapi32_RegCloseKey@4+0x67 New_advapi32_RegCreateKeyExA@36-0x63 @ 0x740c2770
file+0x6d13c @ 0x46d13c
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
81 78 04 98 ba dc fe 0f 85 50 da 03 00 c7 45 fc
exception.symbol:
NDRCContextBinding+0x13 NdrCorrelationInitialize-0x3a0 rpcrt4+0x183d2
exception.instruction:
cmp dword ptr [eax + 4], 0xfedcba98
exception.module:
RPCRT4.dll
exception.exception_code:
0xc0000005
exception.offset:
99282
exception.address:
0x74dd83d2
registers.esp:
1637000
registers.edi:
1957427834
registers.eax:
86
registers.ebp:
1637040
registers.edx:
0
registers.ebx:
1638140
registers.esi:
1
registers.ecx:
86
|
1
|
0 |
0
|