__exception__
|
stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x77710895
stacktrace+0x84 memdup-0x1af @ 0x749a0470
hook_in_monitor+0x45 lde-0x133 @ 0x749942ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x749b3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefdc03243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefdc031fb
denver+0x1fcb05 @ 0xe4cb05
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76fc2ef0
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
0x7eafff
exception.instruction_r:
0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address:
0x77710895
exception.module:
ntdll.dll
exception.exception_code:
0xc0000005
exception.offset:
329877
registers.r14:
0
registers.r15:
0
registers.rcx:
3732632
registers.rsi:
21217280
registers.r10:
0
registers.rbx:
1996238576
registers.rsp:
3734888
registers.r11:
514
registers.r8:
64
registers.r9:
4
registers.rdx:
3733976
registers.r12:
0
registers.rbp:
0
registers.rdi:
12910959
registers.rax:
3732312
registers.r13:
0
|
1
|
0 |
0
|