__exception__
|
stacktrace:
tuc2+0x3db3a @ 0x43db3a
tuc2+0x3cf4b @ 0x43cf4b
tuc2+0x932f2 @ 0x4932f2
tuc2+0x7f324 @ 0x47f324
tuc2+0x97216 @ 0x497216
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
f7 37 89 06 e9 dd 07 00 00 8b 06 33 d2 8a 17 8b
exception.symbol:
tuc2+0x3ae2f
exception.instruction:
div dword ptr [edi]
exception.module:
tuc2.tmp
exception.exception_code:
0xc0000094
exception.offset:
241199
exception.address:
0x43ae2f
registers.esp:
1637776
registers.edi:
31316164
registers.eax:
20513842
registers.ebp:
1637856
registers.edx:
0
registers.ebx:
1
registers.esi:
31316156
registers.ecx:
31316164
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971253248
registers.ebp:
1638096
registers.edx:
7601
registers.ebx:
2130567168
registers.esi:
1971253248
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971249152
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971249152
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971245056
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971245056
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971240960
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971240960
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971236864
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971236864
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971232768
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971232768
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971228672
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971228672
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971224576
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971224576
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971220480
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971220480
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971216384
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971216384
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971212288
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971212288
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971208192
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971208192
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971204096
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971204096
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971200000
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971200000
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x203412 @ 0x603412
kphonelib+0x14d258 @ 0x54d258
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638056
registers.edi:
5035240
registers.eax:
1971195904
registers.ebp:
1638096
registers.edx:
0
registers.ebx:
2130567168
registers.esi:
1971195904
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184549376
registers.ebp:
1638072
registers.edx:
3343547436
registers.ebx:
2093322916
registers.esi:
184549376
registers.ecx:
2005598752
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184553472
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184553472
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184557568
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184557568
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184561664
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184561664
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184565760
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184565760
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184569856
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184569856
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184573952
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184573952
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184578048
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184578048
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184582144
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184582144
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184586240
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184586240
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184590336
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184590336
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184594432
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184594432
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184598528
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184598528
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184602624
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184602624
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184606720
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184606720
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184610816
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184610816
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184614912
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184614912
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184619008
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184619008
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184623104
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184623104
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184627200
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184627200
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184631296
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184631296
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184635392
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184635392
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184639488
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184639488
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184643584
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184643584
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184647680
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184647680
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184651776
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184651776
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184655872
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184655872
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184659968
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184659968
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184664064
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184664064
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184668160
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184668160
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184672256
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184672256
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184676352
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184676352
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184680448
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184680448
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
kphonelib+0x227993 @ 0x627993
kphonelib+0x22e7ea @ 0x62e7ea
kphonelib+0x103f7b @ 0x503f7b
kphonelib+0xc3288 @ 0x4c3288
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 51 54 59 81 c1 04 00 00 00 81
exception.symbol:
kphonelib+0xf48c8
exception.instruction:
push dword ptr [eax]
exception.module:
kphonelib.exe
exception.exception_code:
0xc0000005
exception.offset:
1001672
exception.address:
0x4f48c8
registers.esp:
1638032
registers.edi:
74098
registers.eax:
184684544
registers.ebp:
1638072
registers.edx:
0
registers.ebx:
2093322916
registers.esi:
184684544
registers.ecx:
1638264
|
1
|
0 |
0
|