__exception__
|
stacktrace:
tuc5+0x40c02 @ 0x440c02
tuc5+0x42a47 @ 0x442a47
tuc5+0x48110 @ 0x448110
tuc5+0x3e015 @ 0x43e015
tuc5+0x3cf4b @ 0x43cf4b
tuc5+0x933f2 @ 0x4933f2
tuc5+0x7f424 @ 0x47f424
tuc5+0x97316 @ 0x497316
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
8b 06 c7 45 fc fe ff ff ff 85 db 0f 85 97 34 00
exception.symbol:
WNetCloseEnum+0x14 WNetOpenEnumW-0x11c mpr+0x2dea
exception.instruction:
mov eax, dword ptr [esi]
exception.module:
mpr.dll
exception.exception_code:
0xc0000005
exception.offset:
11754
exception.address:
0x74412dea
registers.esp:
1637604
registers.edi:
31429924
registers.eax:
1637632
registers.ebp:
1637648
registers.edx:
44
registers.ebx:
0
registers.esi:
44
registers.ecx:
0
|
1
|
0 |
0
|
__exception__
|
stacktrace:
tuc5+0x3db3a @ 0x43db3a
tuc5+0x3cf4b @ 0x43cf4b
tuc5+0x933f2 @ 0x4933f2
tuc5+0x7f424 @ 0x47f424
tuc5+0x97316 @ 0x497316
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
f7 37 89 06 e9 dd 07 00 00 8b 06 33 d2 8a 17 8b
exception.symbol:
tuc5+0x3ae2f
exception.instruction:
div dword ptr [edi]
exception.module:
tuc5.tmp
exception.exception_code:
0xc0000094
exception.offset:
241199
exception.address:
0x43ae2f
registers.esp:
1637776
registers.edi:
31425312
registers.eax:
31314176
registers.ebp:
1637856
registers.edx:
0
registers.ebx:
1
registers.esi:
31425304
registers.ecx:
31425312
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971253248
registers.ebp:
1638048
registers.edx:
1971253248
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971253248
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971249152
registers.ebp:
1638048
registers.edx:
1971249152
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971249152
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971245056
registers.ebp:
1638048
registers.edx:
1971245056
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971245056
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971240960
registers.ebp:
1638048
registers.edx:
1971240960
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971240960
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971236864
registers.ebp:
1638048
registers.edx:
1971236864
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971236864
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971232768
registers.ebp:
1638048
registers.edx:
1971232768
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971232768
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971228672
registers.ebp:
1638048
registers.edx:
1971228672
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971228672
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971224576
registers.ebp:
1638048
registers.edx:
1971224576
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971224576
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971220480
registers.ebp:
1638048
registers.edx:
1971220480
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971220480
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971216384
registers.ebp:
1638048
registers.edx:
1971216384
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971216384
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971212288
registers.ebp:
1638048
registers.edx:
1971212288
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971212288
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971208192
registers.ebp:
1638048
registers.edx:
1971208192
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971208192
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971204096
registers.ebp:
1638048
registers.edx:
1971204096
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971204096
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971200000
registers.ebp:
1638048
registers.edx:
1971200000
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971200000
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x191723 @ 0x591723
vbeditcontrol+0x1827cf @ 0x5827cf
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638008
registers.edi:
5000312
registers.eax:
1971195904
registers.ebp:
1638048
registers.edx:
1971195904
registers.ebx:
0
registers.esi:
0
registers.ecx:
1971195904
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134217728
registers.ebp:
1638056
registers.edx:
35
registers.ebx:
0
registers.esi:
134217728
registers.ecx:
2005598752
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134221824
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134221824
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134225920
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134225920
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134230016
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134230016
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134234112
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134234112
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134238208
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134238208
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134242304
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134242304
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134246400
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134246400
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134250496
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134250496
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134254592
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134254592
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134258688
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134258688
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134262784
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134262784
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134266880
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134266880
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134270976
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134270976
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134275072
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134275072
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134279168
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134279168
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134283264
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134283264
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134287360
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134287360
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134291456
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134291456
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134295552
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134295552
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134299648
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134299648
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134303744
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134303744
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134307840
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134307840
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134311936
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134311936
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134316032
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134316032
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134320128
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134320128
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134324224
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134324224
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134328320
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134328320
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134332416
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134332416
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134336512
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134336512
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134340608
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134340608
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134344704
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134344704
registers.ecx:
1638264
|
1
|
0 |
0
|
__exception__
|
stacktrace:
vbeditcontrol+0x1ad57f @ 0x5ad57f
vbeditcontrol+0x186568 @ 0x586568
vbeditcontrol+0x187da1 @ 0x587da1
vbeditcontrol+0xc10ca @ 0x4c10ca
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5
exception.instruction_r:
ff 30 ff 34 24 58 57 89 e7 81 c7 04 00 00 00 83
exception.symbol:
vbeditcontrol+0x1aaf66
exception.instruction:
push dword ptr [eax]
exception.module:
vbeditcontrol.exe
exception.exception_code:
0xc0000005
exception.offset:
1748838
exception.address:
0x5aaf66
registers.esp:
1638016
registers.edi:
273
registers.eax:
134348800
registers.ebp:
1638056
registers.edx:
0
registers.ebx:
0
registers.esi:
134348800
registers.ecx:
1638264
|
1
|
0 |
0
|