__exception__
|
stacktrace:
is-kotgs+0x3d65a @ 0x43d65a
is-kotgs+0x3ca6b @ 0x43ca6b
is-kotgs+0x884b0 @ 0x4884b0
is-kotgs+0x75f02 @ 0x475f02
is-kotgs+0x8c071 @ 0x48c071
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
f7 37 89 06 e9 dd 07 00 00 8b 06 33 d2 8a 17 8b
exception.symbol:
is-kotgs+0x3a94f
exception.instruction:
div dword ptr [edi]
exception.module:
is-KOTGS.tmp
exception.exception_code:
0xc0000094
exception.offset:
239951
exception.address:
0x43a94f
registers.esp:
1637788
registers.edi:
32788660
registers.eax:
5698
registers.ebp:
1637868
registers.edx:
0
registers.ebx:
1
registers.esi:
32788644
registers.ecx:
32788660
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971253248
registers.ebp:
1637800
registers.edx:
7601
registers.ebx:
2130567168
registers.esi:
1971253248
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971249152
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971249152
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971245056
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971245056
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971240960
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971240960
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971236864
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971236864
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971232768
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971232768
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971228672
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971228672
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971224576
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971224576
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971220480
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971220480
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971216384
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971216384
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971212288
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971212288
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971208192
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971208192
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971204096
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971204096
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971200000
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971200000
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x1ac024 @ 0x5ac024
previewer+0x190cd2 @ 0x590cd2
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637760
registers.edi:
1638104
registers.eax:
1971195904
registers.ebp:
1637800
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971195904
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184549376
registers.ebp:
1637768
registers.edx:
828023454
registers.ebx:
3537309792
registers.esi:
184549376
registers.ecx:
4294903528
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184553472
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184553472
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184557568
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184557568
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184561664
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184561664
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184565760
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184565760
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184569856
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184569856
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184573952
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184573952
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184578048
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184578048
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184582144
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184582144
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184586240
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184586240
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184590336
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184590336
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184594432
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184594432
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184598528
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184598528
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184602624
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184602624
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184606720
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184606720
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184610816
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184610816
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184614912
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184614912
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184619008
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184619008
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184623104
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184623104
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184627200
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184627200
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184631296
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184631296
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184635392
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184635392
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184639488
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184639488
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184643584
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184643584
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184647680
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184647680
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184651776
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184651776
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184655872
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184655872
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184659968
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184659968
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184664064
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184664064
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184668160
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184668160
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184672256
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184672256
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184676352
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184676352
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184680448
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184680448
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
previewer+0x19021a @ 0x59021a
previewer+0x1d2bc0 @ 0x5d2bc0
previewer+0x1afd36 @ 0x5afd36
previewer+0x63560 @ 0x463560
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 55 89 e5 81 c5 04 00 00 00 57
exception.symbol:
previewer+0x12013c
exception.instruction:
push dword ptr [eax]
exception.module:
previewer.exe
exception.exception_code:
0xc0000005
exception.offset:
1179964
exception.address:
0x52013c
registers.esp:
1637728
registers.edi:
1638104
registers.eax:
184684544
registers.ebp:
1637768
registers.edx:
0
registers.ebx:
3537309792
registers.esi:
184684544
registers.ecx:
1638264
|
1
|
0 |
0
|