__exception__
|
stacktrace:
tuc7+0x3db3a @ 0x43db3a
tuc7+0x3cf4b @ 0x43cf4b
tuc7+0x932f2 @ 0x4932f2
tuc7+0x7f324 @ 0x47f324
tuc7+0x97216 @ 0x497216
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
f7 37 89 06 e9 dd 07 00 00 8b 06 33 d2 8a 17 8b
exception.symbol:
tuc7+0x3ae2f
exception.instruction:
div dword ptr [edi]
exception.module:
tuc7.tmp
exception.exception_code:
0xc0000094
exception.offset:
241199
exception.address:
0x43ae2f
registers.esp:
1637776
registers.edi:
30248988
registers.eax:
1314623
registers.ebp:
1637856
registers.edx:
0
registers.ebx:
1
registers.esi:
30248980
registers.ecx:
30248988
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971253248
registers.ebp:
1638096
registers.edx:
7601
registers.ebx:
2130567168
registers.esi:
1971253248
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971249152
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971249152
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971245056
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971245056
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971240960
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971240960
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971236864
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971236864
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971232768
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971232768
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971228672
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971228672
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971224576
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971224576
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971220480
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971220480
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971216384
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971216384
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971212288
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971212288
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971208192
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971208192
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971204096
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971204096
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971200000
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971200000
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x223866 @ 0x623866
kphonelib+0x1bcd3e @ 0x5bcd3e
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971195904
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971195904
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184549376
registers.ebp:
1638072
registers.edx:
123170773
registers.ebx:
1013514676
registers.esi:
184549376
registers.ecx:
2005598753
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184553472
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184553472
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184557568
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184557568
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184561664
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184561664
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184565760
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184565760
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184569856
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184569856
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184573952
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184573952
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184578048
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184578048
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184582144
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184582144
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184586240
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184586240
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184590336
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184590336
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184594432
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184594432
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184598528
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184598528
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184602624
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184602624
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184606720
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184606720
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184610816
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184610816
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184614912
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184614912
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184619008
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184619008
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184623104
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184623104
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184627200
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184627200
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184631296
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184631296
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184635392
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184635392
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184639488
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184639488
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184643584
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184643584
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184647680
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184647680
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184651776
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184651776
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184655872
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184655872
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184659968
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184659968
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184664064
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184664064
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184668160
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184668160
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184672256
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184672256
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184676352
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184676352
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184680448
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184680448
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x248746 @ 0x648746
kphonelib+0x246f5a @ 0x646f5a
kphonelib+0x13d28f @ 0x53d28f
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 8b 04 24 55 89 e5 81 c5 04 00 00 00 56 be
exception.symbol:
kphonelib+0x1b0e9c
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1773212
exception.address:
0x5b0e9c
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184684544
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
1013514676
registers.esi:
184684544
registers.ecx:
1638264
|
1
|
0 |
0
|