__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7788ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7788af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632604
registers.edi:
1632692
registers.eax:
23117
registers.ebp:
1632664
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632728
registers.edi:
1632824
registers.eax:
23117
registers.ebp:
1632788
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005446144
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x7786317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x7787199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x7787193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632620
registers.edi:
1632708
registers.eax:
23117
registers.ebp:
1632680
registers.edx:
0
registers.ebx:
0
registers.esi:
33751040
registers.ecx:
1632512
1
0
0
__exception__
Feb. 15, 2022, 10:11 a.m.
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x7785f5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x7785f560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x7787176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7788af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x778718ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x7787174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x77873e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x75d73b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7566db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74857322
0x20360ff
0x2034133
0x2034220
pi_nr_784_(rev)+0x67ebe @ 0x467ebe
pi_nr_784_(rev)+0x6b4e7 @ 0x46b4e7
pi_nr_784_(rev)+0x44db @ 0x4044db
pi_nr_784_(rev)+0x4543 @ 0x404543
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x750933ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77869ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77869ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x7785f4ef
registers.esp:
1632472
registers.edi:
1632568
registers.eax:
23117
registers.ebp:
1632532
registers.edx:
0
registers.ebx:
33751040
registers.esi:
33751040
registers.ecx:
2005342720
1
0
0