__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlRetrieveNtUserPfn+0x2ea RtlOpenCurrentUser-0x2c8 ntdll+0x5ada7 @ 0x7730ada7
RtlRetrieveNtUserPfn+0x4bb RtlOpenCurrentUser-0xf7 ntdll+0x5af78 @ 0x7730af78
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632988
registers.edi:
1633076
registers.eax:
23117
registers.ebp:
1633048
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633112
registers.edi:
1633208
registers.eax:
23117
registers.ebp:
1633172
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999678976
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageNtHeader+0x1b RtlDeleteCriticalSection-0x1476 ntdll+0x3317f @ 0x772e317f
RtlDosPathNameToNtPathName_U_WithStatus+0x33e LdrAccessResource-0x572 ntdll+0x4199e @ 0x772f199e
RtlDosPathNameToNtPathName_U_WithStatus+0x2de LdrAccessResource-0x5d2 ntdll+0x4193e @ 0x772f193e
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1633004
registers.edi:
1633092
registers.eax:
23117
registers.ebp:
1633064
registers.edx:
0
registers.ebx:
0
registers.esi:
33882112
registers.ecx:
1633024
|
1
|
0 |
0
|
__exception__
|
stacktrace:
RtlImageDirectoryEntryToData+0x5c RtlAddRefActivationContext-0x80 ntdll+0x2f5a2 @ 0x772df5a2
RtlImageDirectoryEntryToData+0x1a RtlAddRefActivationContext-0xc2 ntdll+0x2f560 @ 0x772df560
RtlDosPathNameToNtPathName_U_WithStatus+0x10e LdrAccessResource-0x7a2 ntdll+0x4176e @ 0x772f176e
RtlRetrieveNtUserPfn+0x464 RtlOpenCurrentUser-0x14e ntdll+0x5af21 @ 0x7730af21
RtlDosPathNameToNtPathName_U_WithStatus+0x26e LdrAccessResource-0x642 ntdll+0x418ce @ 0x772f18ce
RtlDosPathNameToNtPathName_U_WithStatus+0xee LdrAccessResource-0x7c2 ntdll+0x4174e @ 0x772f174e
RtlLoadString+0x9c TpSetTimer-0x5bd ntdll+0x43e5f @ 0x772f3e5f
LoadStringBaseExW+0x51 LoadStringA-0x91 kernelbase+0x13b2a @ 0x76703b2a
LoadStringA+0x1d RegisterClassExA-0x5a user32+0x1db3e @ 0x7559db3e
New_user32_LoadStringA@16+0x91 New_user32_LoadStringW@16-0x8b @ 0x74047322
0x20560ff
0x2054133
0x2054220
vbc+0x695bf @ 0x4695bf
vbc+0x7b140 @ 0x47b140
vbc+0x4d0b @ 0x404d0b
vbc+0x4d73 @ 0x404d73
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x768733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x772e9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x772e9ea5
exception.instruction_r:
66 39 06 0f 85 7d c8 00 00 8b 46 3c 89 45 dc 3a
exception.symbol:
RtlImageNtHeaderEx+0x5a RtlImageDirectoryEntryToData-0x57 ntdll+0x2f4ef
exception.instruction:
cmp word ptr [esi], ax
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
193775
exception.address:
0x772df4ef
registers.esp:
1632856
registers.edi:
1632952
registers.eax:
23117
registers.ebp:
1632916
registers.edx:
0
registers.ebx:
33882112
registers.esi:
33882112
registers.ecx:
1999575552
|
1
|
0 |
0
|